Inserting security in Github pull requests! — Part 2 (using Github Actions)

Inserting security in GitHub pull requests! — Part 2 (using GitHub Actions)
This post builds up in a previous post about inserting code analysis into GitHub pull requests, in this post, we will focus on implementing this workflow… Continue reading Inserting security in Github pull requests! — Part 2 (using Github Actions)

Inserting security in GitLab merge requests!

Inserting security in Gitlab merge requests!
ShiftLeft Inspect introduces an easy way to insert static code analysis in merge requests workflow in GitLab. To know more, read on.

GitLab offers merge request workflow in their premium version that i… Continue reading Inserting security in GitLab merge requests!

SecureLink announces distribution partnership with ShiftLeft for GCC and Egypt

SecureLink, a risk advisory firm based in Dubai and part of the StarLink group, the region’s “True” Value-Added-Distributor (VAD), announced signing a distribution partnership with ShiftLeft for GCC and Egypt. ShiftLeft is the fastest and most accurate… Continue reading SecureLink announces distribution partnership with ShiftLeft for GCC and Egypt

Accomplishing SOC 2 Type II in the Cloud-Native Kubernetes Era

We’re excited to announce that ShiftLeft has achieved Service Organization Control 2 Type II compliance with zero exceptions. We began this compliance effort 10 months ago. Back in May 2019, we achieved SOC 2 Type I compliance. While this was an… Continue reading Accomplishing SOC 2 Type II in the Cloud-Native Kubernetes Era

ShiftLeft and CircleCI enable orgs to insert security directly into developer pull requests

ShiftLeft, an innovator in automated application security, announced a partnership and deep integration with CircleCI that enables organizations to insert security directly into developer pull requests from code repositories. ShiftLeft Inspect is the f… Continue reading ShiftLeft and CircleCI enable orgs to insert security directly into developer pull requests

Towards a concept of Security Specification for Software Supply Chain

Credit: Amatechinc
Many developers dread code reviews, and one reason for this is probably that most reviewers only offer criticism rather than encouragement. Remember as a peer reviewer, you can also reinforce things you see that are done well, which … Continue reading Towards a concept of Security Specification for Software Supply Chain

Automated Sensitive Data Leak Detection

The average multinational spends several million dollars a year on compliance, while in highly regulated industries — like financial services and defense — the costs can be in the tens or even hundreds of millions. D… Continue reading Automated Sensitive Data Leak Detection