Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

7/9/2020
05:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

RunSafe Security Announces Partnership with JFrog

Together companies aim to harden software binaries without slowing down developers or changing workflows.

MCLEAN, Va., July 9, 2020 /PRNewswire/ -- RunSafe Security, a pioneer of the patented process to immunize software from cyber-attacks and disrupt hacker economics without developer friction, today announced a partnership with JFrog, the Universal DevOps technology leader known for enabling Liquid Software via continuous update flows.

The partnership with JFrog will enable RunSafe to supercharge binary protections via a simple plugin that JFrog users can deploy within their Artifactory repositories and instantly protect binaries and containers. As compiled binaries are dropped into Artifactory, Alkemist protections are automatically applied to each artifact, thus hardening 3rd party libraries and shared objects from cyber-attack.

"Given JFrog customers are focused on continuous, free-flowing development and deployment, we wanted to offer them a way to harden software binaries without slowing down developers or changing workflows," said Joe Saunders, CEO of RunSafe Security. "Alkemist is the only offering to harden software binaries with memory protections without changing functionality, performance, or overhead, making this integration a perfect fit all around."

"We're excited to partner with RunSafe so our customers now have the option to automatically reduce attack surfaces and enable secure continuous deployments," said Casey O'Mara, head of WW business development, JFrog. "With this integration, our users have the ability to deploy the Alkemist plugin to instantly start protecting native binaries and containers."

The RunSafe JFrog plugin is available immediately. For more information and to register for a free trial, visit https://www.runsafesecurity.com/jfrog

About RunSafe
RunSafe Security is on a mission to immunize software from cyber attacks and disrupt hacker economics without developer friction. RunSafe's patented technology, Alkemist, inoculates customers' systems from an entire class of cyber attacks by stopping the infection at its source. Our customers integrate our product across build and deploy toolchains to protect open source, in house code, and 3rd party binaries. Headquartered in McLean, Virginia, with an office in Huntsville, Alabama, RunSafe Security's customers span the critical infrastructure, IIoT, automotive, medical, devsecops and national security industries.

About JFrog
JFrog is on a mission to enable continuous updates through liquid software, empowering developers to code high-quality applications that securely flow to end-users with zero downtime. JFrog is the creator of Artifactory, the heart of the end-to-end Universal DevOps platform for automating, managing, securing, distributing, and monitoring all types of technologies. JFrog products are available as open-sourceon-premise, and on the cloud on AWSMicrosoft Azure, and Google Cloud. As a leading universal, highly available enterprise DevOps solution, the JFrog platform empowers customers with trusted and expedited software releases from code-to-production. JFrog is trusted by more than 5,600 customers, and top global brands depend on JFrog to manage their binaries for their mission-critical applications. JFrog is privately held with offices across North America, Europe, and Asia. Learn more at jfrog.com.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12777
PUBLISHED: 2020-08-10
A function in Combodo iTop contains a vulnerability of Broken Access Control, which allows unauthorized attacker to inject command and disclose system information.
CVE-2020-12778
PUBLISHED: 2020-08-10
Combodo iTop does not validate inputted parameters, attackers can inject malicious commands and launch XSS attack.
CVE-2020-12779
PUBLISHED: 2020-08-10
Combodo iTop contains a stored Cross-site Scripting vulnerability, which can be attacked by uploading file with malicious script.
CVE-2020-12780
PUBLISHED: 2020-08-10
A security misconfiguration exists in Combodo iTop, which can expose sensitive information.
CVE-2020-12781
PUBLISHED: 2020-08-10
Combodo iTop contains a cross-site request forgery (CSRF) vulnerability, attackers can execute specific commands via malicious site request forgery.