Blog

Blog

Verify Digital Asset Integrity Against the Blockchain For Free Using Golang

    CodeNotary’s vcn CLI tool with its immutable verification of any digital asset is a strong addition to any...
Read More
Blog

Protecting the Integrity of Your Downloads (Part #3)

    Intro In the first two installments of this series (here and here), we discovered current best practices for...
Read More
Blog

Going Beyond Digital Certificates with DevOps Asset Integrity Management

      Intro Go beyond digital certificates and get continuous integrity for your entire DevOps process. Developers no longer...
Read More
Blog

What Docker Notary Doesn’t Do

    If you pull from say Docker Hub, modify an image and then upload the new image to a...
Read More
Blog

Free Docker Container Integrity Verification Sought and Found

    One dev in his search to find a way to continuously verify his Docker container integrity recently notified...
Read More
Blog

Before Running a Docker Container Image, Know What’s in the Box

    Modern DevOps environments have brought significant increases in time to market for applications. However, with this gain in...
Read More
Blog

What are Checksums and How to Calculate Them for Downloads?

    Checksums are a traditional way of verifying a download’s file integrity. In this blog, we look at what...
Read More
Blog

$410m Microservices Security Market Validation and the CICD Pipeline

    Much like the industrial revolution witnessed massive production acceleration with the advent of the assembly line, so too...
Read More
Blog

What is Docker and How Does It Work?

    In March 2013, Docker was released as open source software and made its debut to the public. Originally,...
Read More
Blog

Zombie Infestation, Software Developer Tools, & the MS Visual Studio Attack

    In what can be seen as an ironic twist of fate, digital security firms Kaspersky and ESET reported...
Read More
Blog

How CodeNotary Can Protect You From Using Compromised Container Images

  The above video to use CodeNotary to sign a Docker container image. Be sure to note how the video...
Read More
Blog

The Problem with Using a Download Link

    There is a common misconception that HTTPS is protecting files on websites. As HTTPS is only encrypting communication...
Read More
Blog

Staying Safe When Pulling from Maven Central and Other Repos

    Maven works well, especially if you don’t want to rewrite a program from scratch every time you start...
Read More
Blog

Find & Continuously Monitor Your Kubernetes Environment for Unwanted Docker Images

    CodeNotary is the only decentralized, secure and blockchain based Kubernetes solution out there to guarantee the integrity of...
Read More
Blog

Security? With What Time? My Continuous Integration Backlog is Overflowing

    There are numerous security measures a developer can perform but nearly half (48%) of all developers say they...
Read More
Blog

Dos and Don’ts in Ethereum Parity Aura Genesis

    Blockchain is such a new innovation that holds unknown potential, it’s still very much a journey and not...
Read More
Blog

Free Continuous Integrity Verification of your Docker Containers

    In our last blog (here), we showed how to sign and verify your build code. With an established...
Read More
Blog

Code Signing Certificates’ Journey of Pain #3: When Even Signing Isn’t Enough

This is the third blog of the series and hopefully the last one as I am confident to have gone...
Read More
Blog

Verify the Integrity of a Docker Image for Free with CodeNotary

With CodeNotary you can finally verify that your Docker images are safe, untampered, and authentic. Thanks to blockchain technology and...
Read More
Blog

Protect Yourself from the Recent dockerhub.com Attack

Last week's dockerhub.com attack affects hundreds of thousands of accounts and exposes their containers to malicious code. We at CodeNotary...
Read More