Argon Blog

Thoughts, news, and musings from Software Supply Chain, CI/CD, and DevOps
experts, interviews, articles, and breach analyses.

6 Steps to Comprehensive DevOps Security

DevOps has evolved into a standard practice of software development. According to…

Eylam Milner
Apr 18 · 9 min read

What is Broken Authentication and How Can You Prevent it

Logging in to websites to access your accounts isn’t as secure as…

Eilon Elhadad
Apr 11 · 10 min read

Best practices for Improving Software Integrity

Today’s businesses and enterprises are heavily dependent on software and applications for…

Eilon Elhadad
Mar 31 · 5 min read

8 Examples of OWASP Security Misconfigurations

More than 154 million profiles of US voters were exposed to cyber…

Eilon Elhadad
Mar 28 · 8 min read

The Essential Guide to SDLC Security

The software development lifecycle (SDLC) is the process that organisations use to…

Eran Orzel
Mar 24 · 5 min read

The Complete Cyber Hygiene Checklist

With how quickly the IT landscape is changing, applications are being developed…

Eran Orzel
Mar 21 · 6 min read

Looking to harden your security posture?

open source vulnerability scanner