Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

7/9/2020
05:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

RunSafe Security Announces Partnership with JFrog

Together companies aim to harden software binaries without slowing down developers or changing workflows.

MCLEAN, Va., July 9, 2020 /PRNewswire/ -- RunSafe Security, a pioneer of the patented process to immunize software from cyber-attacks and disrupt hacker economics without developer friction, today announced a partnership with JFrog, the Universal DevOps technology leader known for enabling Liquid Software via continuous update flows.

The partnership with JFrog will enable RunSafe to supercharge binary protections via a simple plugin that JFrog users can deploy within their Artifactory repositories and instantly protect binaries and containers. As compiled binaries are dropped into Artifactory, Alkemist protections are automatically applied to each artifact, thus hardening 3rd party libraries and shared objects from cyber-attack.

"Given JFrog customers are focused on continuous, free-flowing development and deployment, we wanted to offer them a way to harden software binaries without slowing down developers or changing workflows," said Joe Saunders, CEO of RunSafe Security. "Alkemist is the only offering to harden software binaries with memory protections without changing functionality, performance, or overhead, making this integration a perfect fit all around."

"We're excited to partner with RunSafe so our customers now have the option to automatically reduce attack surfaces and enable secure continuous deployments," said Casey O'Mara, head of WW business development, JFrog. "With this integration, our users have the ability to deploy the Alkemist plugin to instantly start protecting native binaries and containers."

The RunSafe JFrog plugin is available immediately. For more information and to register for a free trial, visit https://www.runsafesecurity.com/jfrog

About RunSafe
RunSafe Security is on a mission to immunize software from cyber attacks and disrupt hacker economics without developer friction. RunSafe's patented technology, Alkemist, inoculates customers' systems from an entire class of cyber attacks by stopping the infection at its source. Our customers integrate our product across build and deploy toolchains to protect open source, in house code, and 3rd party binaries. Headquartered in McLean, Virginia, with an office in Huntsville, Alabama, RunSafe Security's customers span the critical infrastructure, IIoT, automotive, medical, devsecops and national security industries.

About JFrog
JFrog is on a mission to enable continuous updates through liquid software, empowering developers to code high-quality applications that securely flow to end-users with zero downtime. JFrog is the creator of Artifactory, the heart of the end-to-end Universal DevOps platform for automating, managing, securing, distributing, and monitoring all types of technologies. JFrog products are available as open-sourceon-premise, and on the cloud on AWSMicrosoft Azure, and Google Cloud. As a leading universal, highly available enterprise DevOps solution, the JFrog platform empowers customers with trusted and expedited software releases from code-to-production. JFrog is trusted by more than 5,600 customers, and top global brands depend on JFrog to manage their binaries for their mission-critical applications. JFrog is privately held with offices across North America, Europe, and Asia. Learn more at jfrog.com.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/13/2020
Where Are the 'Great Exits' in the Data Security Market?
Dave Cole, Cofounder and CEO, Open Raven,  10/13/2020
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15256
PUBLISHED: 2020-10-19
A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and settin...
CVE-2020-15261
PUBLISHED: 2020-10-19
On Windows the Veyon Service before version 4.4.2 contains an unquoted service path vulnerability, allowing locally authenticated users with administrative privileges to run malicious executables with LocalSystem privileges. Since Veyon users (both students and teachers) usually don't have administr...
CVE-2020-6084
PUBLISHED: 2020-10-19
An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malic...
CVE-2020-6085
PUBLISHED: 2020-10-19
An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malic...
CVE-2020-10746
PUBLISHED: 2020-10-19
A flaw was found in Infinispan version 10, where it permits local access to controls via both REST and HotRod APIs. This flaw allows a user authenticated to the local machine to perform all operations on the caches, including the creation, update, deletion, and shutdown of the entire server.