veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

134
active users

#SoftwareSupplyChain

1 post1 participant0 posts today
ActiveState<p>Discover the Power of Open Source Management</p><p>Managing open-source dependencies, vulnerabilities, and updates doesn’t have to be a headache. The ActiveState Platform simplifies it all!</p><p>✅ Discover &amp; catalog components<br>✅ Assess vulnerabilities<br>✅ Streamline workflows</p><p>Empower your team with secure, scalable solutions.</p><p>Learn more: <a href="https://www.activestate.com/platform/discover/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">activestate.com/platform/disco</span><span class="invisible">ver/</span></a></p><p><a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevSecOps</span></a> <a href="https://mastodon.social/tags/SoftwareSupplyChain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareSupplyChain</span></a></p>
InfoQ<p>Did you know❓ By the end of 2024, the number of malware packages had TRIPLED compared to the previous year. 😱</p><p>Want to learn how the EU Cyber Resilience Act can improve your software project's <a href="https://techhub.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> and help curb the alarming increase in <a href="https://techhub.social/tags/SoftwareSupplyChain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareSupplyChain</span></a> attacks?</p><p>🎧Listen to the <a href="https://techhub.social/tags/InfoQ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoQ</span></a> <a href="https://techhub.social/tags/podcast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>podcast</span></a> with Eddie Knight, OSPO lead at Sonatype, for more insights: <a href="https://bit.ly/3RsWazK" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/3RsWazK</span><span class="invisible"></span></a> </p><p>Don’t miss out! <a href="https://techhub.social/tags/transcript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>transcript</span></a> included </p><p><a href="https://techhub.social/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://techhub.social/tags/Compliance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Compliance</span></a></p>
Brian Greenberg<p>⚠️ Cyber threat: AI code assistants are opening up new supply chain vulnerabilities.</p><p>LLMs are generating package names that don’t exist — and attackers are quick to scoop them up.<br>This tactic — dubbed slopsquatting — is as clever as it is dangerous.</p><p>🤖 Fake package names created by AI<br>💣 Threat actors publish malicious lookalikes<br>🔗 Developers unknowingly install backdoors<br>🧠 The fix: verify everything, especially autogenerated code</p><p>This is where secure coding and secure prompting must intersect.</p><p><a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevSecOps</span></a> <a href="https://infosec.exchange/tags/SoftwareSupplyChain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareSupplyChain</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/AIInDevelopment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIInDevelopment</span></a><br><a href="https://www.theregister.com/2025/04/12/ai_code_suggestions_sabotage_supply_chain/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/04/12/ai_</span><span class="invisible">code_suggestions_sabotage_supply_chain/</span></a></p>
InfoQ<p>Dive into critical <a href="https://techhub.social/tags/SoftwareSupplyChain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareSupplyChain</span></a> security risks in <a href="https://techhub.social/tags/FinTech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FinTech</span></a>!</p><p>Learn from Mykhailo Brodskyi in this <a href="https://techhub.social/tags/InfoQ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoQ</span></a> video, where he breaks down effective mitigation strategies.</p><p>Real case studies &amp; demo included. </p><p>👀 Watch now for insights: <a href="https://bit.ly/4lEJnbo" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/4lEJnbo</span><span class="invisible"></span></a> </p><p>📄 <a href="https://techhub.social/tags/transcript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>transcript</span></a></p><p><a href="https://techhub.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://techhub.social/tags/SoftwareArchitecture" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareArchitecture</span></a> <a href="https://techhub.social/tags/InfoQDevSummit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoQDevSummit</span></a></p>
JAVAPRO<p><a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> ≠ zero liability. In Part 4, Steve Poole explains how <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a>-driven <a href="https://mastodon.social/tags/OSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSS</span></a> may face new legal pressure. Regulations evolve. Ignoring them won’t shield you. AI risk classification now belongs in your <a href="https://mastodon.social/tags/CI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CI</span></a>/CD</p><p>Read: <a href="https://javapro.io/2025/04/10/move-fast-break-laws-ai-open-source-and-devs-part-4/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">javapro.io/2025/04/10/move-fas</span><span class="invisible">t-break-laws-ai-open-source-and-devs-part-4/</span></a></p><p><a href="https://mastodon.social/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a> <a href="https://mastodon.social/tags/Java" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Java</span></a> <a href="https://mastodon.social/tags/SoftwareSupplyChain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareSupplyChain</span></a></p>
Margaret Eldridge<p>Celebrating Business Success with Open Source by VM (Vicky) Brasseur, now in print!</p><p>🔗 Read more: <a href="https://medium.com/pragmatic-programmers/business-success-with-open-source-f3de286aac2b" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/pragmatic-programme</span><span class="invisible">rs/business-success-with-open-source-f3de286aac2b</span></a></p><p>📘 ebook: <a href="https://pragprog.com/titles/vbfoss" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pragprog.com/titles/vbfoss</span><span class="invisible"></span></a></p><p><a href="https://hachyderm.io/tags/foss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foss</span></a> <a href="https://hachyderm.io/tags/leadership" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>leadership</span></a> <a href="https://hachyderm.io/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://hachyderm.io/tags/softwaresupplychain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>softwaresupplychain</span></a> <a href="https://hachyderm.io/tags/pragprog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pragprog</span></a> <a href="https://hachyderm.io/tags/books" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>books</span></a></p>
VM (Vicky) Brasseur<p>Today's the day! My latest book, Business Success with <a href="https://social.vmbrasseur.com/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a>, is _finally_ IN PRINT!</p><p>Learn all about Open Source, <a href="https://social.vmbrasseur.com/tags/FreeSoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeSoftware</span></a>, <a href="https://social.vmbrasseur.com/tags/licensing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>licensing</span></a>, and how you can bring it all together as elements of a rock solid <a href="https://social.vmbrasseur.com/tags/business" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>business</span></a> <a href="https://social.vmbrasseur.com/tags/strategy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>strategy</span></a>. Learn about and secure your <a href="https://social.vmbrasseur.com/tags/SoftwareSupplyChain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareSupplyChain</span></a>, release and contribute to projects, and be a good corporate citizen and steward of this shared resource.</p><p>Check it out and order here! (ebook or paper) <a href="https://fossbiz.com" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">fossbiz.com</span><span class="invisible"></span></a></p>
JAVAPRO<p>Global software, local laws. Part 4 of Steve Poole´s series dives into export controls, <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> liability &amp; compliance in a divided world. Regional hosting, risk audits &amp; readiness matter more than ever.</p><p>👉Read: <a href="https://javapro.io/2025/04/10/move-fast-break-laws-ai-open-source-and-devs-part-4/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">javapro.io/2025/04/10/move-fas</span><span class="invisible">t-break-laws-ai-open-source-and-devs-part-4/</span></a></p><p><a href="https://mastodon.social/tags/AIRegulation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIRegulation</span></a> <a href="https://mastodon.social/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a> <a href="https://mastodon.social/tags/Java" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Java</span></a> <a href="https://mastodon.social/tags/SoftwareSupplyChain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareSupplyChain</span></a></p>
JAVAPRO<p>🇺🇸 <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a>. 🇪🇺 <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a>. 🇨🇳 <a href="https://mastodon.social/tags/DataControl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataControl</span></a>. If you ship software, you’ll have to deal with all three. Steve Poole breaks it down in Part 2 of his must-read series.</p><p>Read now: <a href="https://javapro.io/2025/04/03/move-fast-break-laws-ai-open-source-and-devs-part-2/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">javapro.io/2025/04/03/move-fas</span><span class="invisible">t-break-laws-ai-open-source-and-devs-part-2/</span></a></p><p><a href="https://mastodon.social/tags/Compliance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Compliance</span></a> <a href="https://mastodon.social/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a> <a href="https://mastodon.social/tags/SoftwareSupplyChain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareSupplyChain</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a></p>
Finite State<p>Learn how Finite State aligns with the S2C2F framework to secure your software supply chain.</p><p>📥 Download the datasheet: <a href="https://finitestate.io/resources/s2c2f-requirements-datasheet" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">finitestate.io/resources/s2c2f</span><span class="invisible">-requirements-datasheet</span></a></p><p><a href="https://mastodon.social/tags/S2C2F" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>S2C2F</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/SoftwareSupplyChain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareSupplyChain</span></a></p>
JAVAPRO<p>Think your code is safe outside the EU? The Brussels Effect says otherwise. Steve Poole explains why borders won’t protect your stack.</p><p>👉 Find out what’s coming before it hits you: <a href="https://javapro.io/2025/04/03/move-fast-break-laws-ai-open-source-and-devs-part-2/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">javapro.io/2025/04/03/move-fas</span><span class="invisible">t-break-laws-ai-open-source-and-devs-part-2/</span></a></p><p><a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/Compliance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Compliance</span></a> <a href="https://mastodon.social/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a> <a href="https://mastodon.social/tags/SoftwareSupplyChain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareSupplyChain</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a></p>
JAVAPRO<p><a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a>. <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a>. Regulation. If my stack gets hacked… is that my fault now? What devs don’t know will hurt them. Steve Poole kicks off his must-read series. Read it now—before the regulators read your code: <a href="https://javapro.io/2025/04/01/move-fast-break-laws-ai-open-source-and-devs-part-1/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">javapro.io/2025/04/01/move-fas</span><span class="invisible">t-break-laws-ai-open-source-and-devs-part-1/</span></a></p><p><a href="https://mastodon.social/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a> <a href="https://mastodon.social/tags/SoftwareSupplyChain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareSupplyChain</span></a> <a href="https://mastodon.social/tags/DevLife" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevLife</span></a></p>
anchore<p>Before Policy-as-Code: Arcane compliance docs, 11th-hour shipping delays 😩</p><p>After Policy-as-Code: Automated and immediate feedback without leaving your terminal ✨</p><p>See how: <a href="https://anchore.com/blog/sbom-and-policy-as-code-a-developers-guide/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">anchore.com/blog/sbom-and-poli</span><span class="invisible">cy-as-code-a-developers-guide/</span></a></p><p><a href="https://mstdn.business/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevSecOps</span></a> <a href="https://mstdn.business/tags/SBOM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBOM</span></a> <a href="https://mstdn.business/tags/PolicyAsCode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PolicyAsCode</span></a> <a href="https://mstdn.business/tags/SoftwareSupplyChain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareSupplyChain</span></a></p>
The DefendOps Diaries<p>Sophisticated npm Attack Highlights Software Supply Chain Vulnerabilities</p><p><a href="https://thedefendopsdiaries.com/sophisticated-npm-attack-highlights-software-supply-chain-vulnerabilities/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedefendopsdiaries.com/sophis</span><span class="invisible">ticated-npm-attack-highlights-software-supply-chain-vulnerabilities/</span></a></p><p><a href="https://infosec.exchange/tags/npmattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>npmattack</span></a><br><a href="https://infosec.exchange/tags/softwaresupplychain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>softwaresupplychain</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a><br><a href="https://infosec.exchange/tags/opensourcesecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensourcesecurity</span></a><br><a href="https://infosec.exchange/tags/maliciouspackages" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>maliciouspackages</span></a></p>
anchore<p>👋 We're new here! Hello. Happy Friday everyone. </p><p>Are there any public lists of interesting <a href="https://mstdn.business/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> / <a href="https://mstdn.business/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> / <a href="https://mstdn.business/tags/SoftwareSupplyChain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareSupplyChain</span></a> people and orgs to follow on the fediverse beyond the common hashtags?</p>
Lorenzo De Carli<p><a href="https://fediscience.org/tags/academic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>academic</span></a> <a href="https://fediscience.org/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a> time! I am trying this Mastodon thingy and liking it so far. I am an Assistant Professor of Electrical and Software Engineering at the University of Calgary, in beautiful <a href="https://fediscience.org/tags/alberta" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>alberta</span></a> 🏔️, <a href="https://fediscience.org/tags/canada" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>canada</span></a> 🇨🇦. I am interested in all things <a href="https://fediscience.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a>, particularly <a href="https://fediscience.org/tags/iot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iot</span></a>, <a href="https://fediscience.org/tags/softwaresupplychain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>softwaresupplychain</span></a>, and intersections with <a href="https://fediscience.org/tags/hci" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hci</span></a> and <a href="https://fediscience.org/tags/usableSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usableSecurity</span></a></p>