How To Install Third-Party Linux Applications with Deb-Get

nikholas

Your Linux distro already comes with a great package manager but sometimes you need applications that aren’t available via the official repositories. 

Third party applications, such as Google Chrome, Slack, Zoom, Visual Studio Code are provided by their respective publishers. For Debian and Ubuntu systems these are provided as Debian package files (.deb) and for Fedora / Red Hat as RPM packages. These packages can be installed using your preferred OS GUI package manager, or they can be installed using a command line tool. But what if we had a tool which handled downloading, installing, upgrading and removing these third-party

  Read more

Data Theorem Supply Chain Secure identifies third-party vulnerabilities across the application software stack

nikholas

Data Theorem launched Supply Chain Secure, an attack surface management (ASM) product to address software supply chain security threats across the application full-stack of APIs, cloud services, SDKs, and open source software.

Data Theorem Supply Chain Secure

Data Theorem uniquely identifies third-party vulnerabilities across the application software stack with runtime analysis and dynamic inventory discovery that goes beyond traditional source code static analysis approaches and processing of software bill of materials (SBOMs).

High-profile security breaches such as SolarWinds, Kaseya, and Apache Log4j demonstrated the widespread damage that can occur for enterprise supply chains if third-party APIs, cloud services, SDKs, and open-source software have security flaws,

  Read more