Syndicated Blog

OX Security
Setting the Standard for Software Supply Chain Security
Picture1

Understanding and Mitigating the Fedora Rawhide Vulnerability (CVE-2024-3094)

CVE-2024-3094 is a reported supply chain compromise of the xz libraries. The resulting interference with sshd authentication could enable an attacker to gain unauthorized access to the system. Overview Malicious code was ...

Bridging the Gap: Integrating SOCs into Application Security for Enhanced Cyber Resilience

| | Application Security
Historically, Security Operations Centers (SOCs) and Application Security (AppSec) programs have operated as distinct entities within the broader cybersecurity framework of an organization. SOCs have been the stronghold of real-time threat detection, ...

Securing Your Software Development in Compliance with CISA: How OX Security Simplifies the Process

| | Compliance
The Cybersecurity and Infrastructure Security Agency (CISA) recently released its new Secure Software Development Attestation Form, which mandates significant responsibilities and declarations from software producers to ensure the security and integrity of ...

Think CEOs Are Not Liable for Cyber Risk….Think Again

| | Compliance
The Cybersecurity and Infrastructure Security Agency (CISA) recently released its new Secure Software Development Attestation Form. The announcement indicates an ongoing trend placing the cybersecurity onus on software vendors and their organization’s ...
ox secrurity jira ticket workflow

Say Goodbye to Manual AppSec Overhead: Unleashing the Power OX’s Automated No-Code Workflows

| | Active ASPM
Last month, we unveiled our Active ASPM Platform which includes our newest feature, no-code automation workflows. OX has established itself as a frontrunner in automating the discovery, analysis, and prioritization of security ...

Betting on a New Approach with Active ASPM

Streamlining Application Security at 888 Holdings with OX Security In betting and gaming, application security (AppSec) is critical in protecting the integrity and reliability of digital services. 888 Holdings, a global frontrunner ...

ONCDs’ call for memory safety brings considerable challenges, changes, and costs

| | Compliance
The recent publication Back to the Building Blocks: A Path Toward Secure and Measurable Software by the White House Office of the National Cyber Director (ONCD) provides additional detail and strategic direction ...

Key Considerations for Selecting an SBOM Tool

| | SBOM
With security integrated into development, selecting the right Software Bill of Materials (SBOM) generation tool for your organization is crucial not only for compliance but also as a fundamental component of cybersecurity ...
ox security sbom

SBOM: The Ingredients Label for Cybersecurity

| | SBOM
Until the 60s, most Americans prepared most of their meals at home. The appetite for pre-packaged food rose in that decade, and the shift in consumer demand resulted in public demand for ...
gitlab ox identity provider

Streamlining DevOps: How to Integrate OX with GitLab for Enhanced Security

| | Active ASPM, Announcement
We’re thrilled to announce that The OX Active ASPM platform is now fully integrated with GitLab. With this integration, users no longer have to choose between rapid deployment or security in their ...