Defending Yourself From the Trivy CI/CD Compromise: How to Check Your Exposure and Respond
Over the past few years, Boost Security’s research team at Boost Labs has been deeply curious about...
Here we’ll offer information relevant to developers and security automation for the software supply chain.

This free guide explores the business level risks of the software supply chain and offers examples for how they materialize. We'll review four key risk categories; your developers, 1st party code, 3rd party code and the development infrastructure, and break down specific vulnerabilities and how they're compromised in each category.

Is BoostSecurity right for you? What problem do you solve? Read more in our Executive Summary / At-a-Glance document, in the PDF below.

Over the past few years, Boost Security’s research team at Boost Labs has been deeply curious about...
On February 20th, Anthropic announced Claude Code Security; a new capability (for now within Claude...
TL;DR We're releasing bagel, an open-source CLI that inventories security-relevant metadata on...
