Argon Blog

Thoughts, news, and musings from Software Supply Chain, CI/CD, and DevOps
experts, interviews, articles, and breach analyses.

The Complete Guide to SBOM (Software Bill of Materials)

Developers using third-party and community-built products is routine practice with vulnerabilities stemming…

Eran Orzel
Jan 27 · 9 min read

The Step-by-Step Guide to Preventing Remote Code Execution (RCE)

A 2017 cyber attack affected 200,000 computers across the globe, causing damages…

Guy Ben-Aharon
Jan 12 · 7 min read

The Complete API Security Checklist

Developing modern applications can be highly complex due to several disparate services…

Eyal Katz
Jan 10 · 6 min read

Log4j Targeted Cyberattacks: Reducing Open-Source Risks

On December 9th, the Log4Shell vulnerability (CVE-2021-44228) was published in a GitHub repository and made public….

Eran Orzel
Jan 03 · 3 min read

How to Analyze the OWASP Dependency-Check?

While the big benefit of open source is the large developer community…

Eyal Katz
Dec 29 · 8 min read

9 Best Practices for Secrets Management

A recent Forrester report found that about 63% of IT leaders claim…

Eran Orzel
Dec 21 · 6 min read

Looking to harden your security posture?

open source vulnerability scanner