Kaylin Trychon

180 Followers
208 Following
35 Posts
Chaos Causer @ Chainguard | Comms Aerospace Village | Prev Security Comms Lead Google | Rule Bender l New Englander
Twitterhttps://twitter.com/KaylinTrychon
LinkedInhttps://www.linkedin.com/in/kaylintrychon/
Chainguardhttps://chainguard.dev/
Aerospace Villagehttps://aerospacevillage.org/

Really cool news out of Chainguard today about Wolfi: it's memory safe!

Learn how we built the memory safety into the distro here: https://www.chainguard.dev/unchained/building-the-first-memory-safe-distro-wolfi

Thanks to Josh Aas & Internet Security Research Group for the collaboration on this one.

Memory safety vulnerabilities are responsible for the vast majority of critical, remotely exploitable, and in-the-wild attacks we see on software. According to Consumer Reports, 60 to 70% of browser and kernel vulnerabilities—and security bugs found in C/C++ code bases—are due to memory unsafety.

Through a combination of leveraging new libraries written in memory safe languages as soon as possible while being as safe as we can with libraries in unsafe languages, we believe that Wolfi is setting the standard when it comes to memory safety in distributions.

Building the first memory safe distro

Thanks to our ISRG partnership, we are enabling memory-safe TLS by introducing Rustls to Wolfi, which now sets the standard for memory safety in distributions. Everything you need to know about securing the software supply chain.

Latest from the brilliant @ariadne:

Understanding the relationship between FOSS and the “software supply chain”

https://www.chainguard.dev/unchained/understanding-the-relationship-between-foss-and-the-software-supply-chain

Her top 3 takeaways for software distribution:

🙅Nobody can prevent you from writing your own software
🗣️Consumers can ask you for things, but they can't require them
🤝If you want to distribute your software via a particular channel, you need to follow that channel's rules

Understanding the relationship between FOSS and the “software supply chain”

Software supply chain: understand the relationship between software distributors and software consumers and what FOSS maintainers are or are not responsible for Everything you need to know about securing the software supply chain.

Happy Friday the 13th! You know what's suspicious? The stale software likely running in your production environment 🤔

Chainguard's CTO Matthew Moore walks through a practice dubbed “Build Horizon” at Google that imposes a maximum age on build artifacts, and how you can leverage #ChainguardEnforce to detect violations of this policy.

https://www.chainguard.dev/unchained/conquer-your-build-horizon-with-chainguard-enforce-in-2023

Conquer your Build Horizon with Chainguard Enforce in 2023

Everything you need to know about securing the software supply chain.

You could say I've learned a few things since joining Chainguard.

Today, we published a blog post I wrote about the benefits of keyless software signing...

This was inspired after reading about the recent CircleCI & Slack security incidents.

Sneak peek at some of the *key* benefits I run through:

🔒 Improved security (obviously)
‍ 🔀 Enhanced traceability
‍ 🧘‍♀️ Increased flexibility
‍ 👥 Reduced reliance on individual team members

More: https://www.chainguard.dev/unchained/benefits-of-keyless-software-signing

Benefits of Keyless Software Signing

Keyless software signing uses ephemeral keys (not cryptographic) to sign and verify software. Get started using Chainguard Enforce Signing, powered by Sigstore. Everything you need to know about securing the software supply chain.

Do you like keys, values and memes, and dislike CVEs? Try out the Chainguard #Redis image today!

https://www.chainguard.dev/unchained/chainguard-image-redis

Chainguard Image Now Available for Redis

Chainguard Images adds Redis 7 to supported databases. The Redis image is based on glibc and built on Wolfi so it is minimal, secure-by-default, and up-to-date. Everything you need to know about securing the software supply chain.

@boblord @dangoodin @gdbassett I agree & cited your 2015 point about “lack of evidence” in a blog post a few weeks ago: https://discernibleinc.com/blog/remove-these-cardinal-sins-from-your-data-breach-statementsnbsp
As a comms pro, I believe we fail when we treat security comms as crisis comms rather than a proactive never-ending dialogue with stakeholders about ongoing risk. Don’t treat incidents as something that will eventually “be over.”
Scrub these Phrases from Your Data Breach Statements  — Discernible Inc

In the event of a security incident, it's critical that your response is both fast and accurate. Unfortunately, many organizations make the mistake of including one or more of the following three elements in their public statements, which impairs the credibility and trustworthiness of their response

Discernible Inc

Are SBOMs Any Good? Preliminary Measurement of the Quality of Open Source Project SBOMs

https://www.chainguard.dev/unchained/are-sboms-any-good-preliminary-measurement-of-the-quality-of-open-source-project-sboms

Are SBOMs Any Good? Preliminary Measurement of the Quality of Open Source Project SBOMs

Everything you need to know about securing the software supply chain.

Zelensky expected to come to DC tomorrow to address Congress. First trip out of the country since the war begun

After acquiring a technology product, we've all had to find, and then implement the guidance in the product's hardening guide (or a third party's guide in some cases). You know, to change the unsafe defaults to safer ones.

What's your favorite example of a hardening guide (for an SMB or enterprise product) that clearly shows how dangerous the product was as it left the factory.

Links to the guide and some commentary would be most welcome! (Or you can DM me, if I can figure out how those work here)

Please boot for reach. 🔐​🙏​

NEW: Chainguard Enforce now has support for the Rego Policy Language.

More dets on how to get started with it here: https://www.chainguard.dev/unchained/getting-started-with-rego-policies

#supplychainsecurity

Getting started with Rego policies in Chainguard Enforce

Everything you need to know about securing the software supply chain.