BELFAST, Northern Ireland--(BUSINESS WIRE)--Cloudsmith, the cloud-native artifact management platform redefining software supply chain security, has raised a $23 million Series B funding round led by ...
A growing market for supply chain sustainability software is being driven primarily by increasing scrutiny from regulators and stakeholders of ESG performance, as well as a greater consideration of ...
A new report out today from software supply chain company JFrog Ltd. warns that an expansion of artificial intelligence technology across the software supply chain has resulted in an alarming rise in ...
HAMBURG, Germany & MINNEAPOLIS & CARY, N.C.--(BUSINESS WIRE)--Körber Supply Chain Software, a joint venture between Körber AG and KKR, and leader in end-to-end supply chain software solutions, signed ...
There’s a prevailing trend to force organizations into looking more closely at their Cybersecurity – Supply Chain Risk Management (C-SCRM). Key regulations both here in the U.S. and EU are beginning ...
Manifest, a technology transparency platform for software and AI supply chains, today announced it has raised a $15M Series A led by Ensemble VC, with participation from AE Ventures (a strategic ...
Data Fabrics are a key foundational technology for building an agile supply chain. When one thinks of supply chain software vendors, the name InterSystems may not spring to mind. The company aims to ...
FreshX, a startup developing supply chain software to help food companies and freight brokers with cold chain transportation and storage, has won first place in the Edward L. Kaplan, ’71, New Venture ...
In recent years, software supply chain attacks have moved from the periphery of concerns to the forefront. According to Verizon's "2024 Data Breach Investigations Report," the use of vulnerabilities ...
Cybeats Technologies Corp. ( ($TSE:CYBT) ) has shared an announcement. Cybeats Technologies Corp. has appointed software supply chain security ...
Shai-Hulud is the worst-ever npm JavaScript attack. This software supply chain worm attack is still ongoing. Here are some ways you can prevent such attacks. For those of you who aren't Dune fans, ...
Malicious campaigns targeting code used by developers of AI applications underscore the need to develop comprehensive risk-based programs around software dependencies and components. Widespread flaws ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results