Blog

Blog

Protecting Against $120mm Invoice Scam Loss Using Blockchain

    $120 million, that was the price tag for Google and Facebook. Over the last few years, a hacker...
Read More
Blog

Protect Yourself with Blockchain from Canonical-like GitHub Attacks

    On Saturday, July 6, 2019, the GitHub account of a Linux Ubuntu distributor, Canonical Ltd, was hacked. Canonical...
Read More
News

CodeNotary Product Update – July 2019

    It’s finally time for a new CodeNotary product update again. The update includes organizational management and signing features,...
Read More
Blog

Guarantee Trust of Your Company’s Deployed DevOps Assets with Blockchain

    In DevOps, where teams can constantly be rearranged and sorted for different purposes, the ability to form groups...
Read More
Blog

Bulletproof Your JavaScript App Integrity for Free with Blockchain – Integration Available on NPM

      In 2019, JavaScript remains one of the top languages used on GitHub. It has the most contributors...
Read More
Blog

Integrating Blockchain-based Code Signing into Your Application Using Golang

    Intro Knowing if your digital assets are safe to use will help you avoid complications from compromised or...
Read More
Blog

Storing Sensitive Customer Data in a Blockchain-based Solution

    Intro Once data is on the blockchain, it's there forever. Blockchains are permanent, immutable storage with no way...
Read More
Blog

Verify Digital Asset Integrity Against the Blockchain For Free Using Golang

    CodeNotary’s vcn CLI tool with its immutable verification of any digital asset is a strong addition to any...
Read More
Blog

Protecting the Integrity of Your Downloads (Part #3)

    Intro In the first two installments of this series (here and here), we discovered current best practices for...
Read More
Blog

Going Beyond Digital Certificates with DevOps Asset Integrity Management

      Intro Go beyond digital certificates and get continuous integrity for your entire DevOps process. Developers no longer...
Read More
Blog

What Docker Notary Doesn’t Do

    If you pull from say Docker Hub, modify an image and then upload the new image to a...
Read More
Blog

Free Docker Container Integrity Verification Sought and Found

    One dev in his search to find a way to continuously verify his Docker container integrity recently notified...
Read More
Blog

Before Running a Docker Container Image, Know What’s in the Box

    Modern DevOps environments have brought significant increases in time to market for applications. However, with this gain in...
Read More
Blog

What are Checksums and How to Calculate Them for Downloads?

    Checksums are a traditional way of verifying a download’s file integrity. In this blog, we look at what...
Read More
Blog

$410m Microservices Security Market Validation and the CICD Pipeline

    Much like the industrial revolution witnessed massive production acceleration with the advent of the assembly line, so too...
Read More
Blog

What is Docker and How Does It Work?

    In March 2013, Docker was released as open source software and made its debut to the public. Originally,...
Read More
Blog

Zombie Infestation, Software Developer Tools, & the MS Visual Studio Attack

    In what can be seen as an ironic twist of fate, digital security firms Kaspersky and ESET reported...
Read More
Blog

How CodeNotary Can Protect You From Using Compromised Container Images

  The above video to use CodeNotary to sign a Docker container image. Be sure to note how the video...
Read More
Blog

The Problem with Using a Download Link

    There is a common misconception that HTTPS is protecting files on websites. As HTTPS is only encrypting communication...
Read More
Blog

Staying Safe When Pulling from Maven Central and Other Repos

    Maven works well, especially if you don’t want to rewrite a program from scratch every time you start...
Read More