Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

7/9/2020
05:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

RunSafe Security Announces Partnership with JFrog

Together companies aim to harden software binaries without slowing down developers or changing workflows.

MCLEAN, Va., July 9, 2020 /PRNewswire/ -- RunSafe Security, a pioneer of the patented process to immunize software from cyber-attacks and disrupt hacker economics without developer friction, today announced a partnership with JFrog, the Universal DevOps technology leader known for enabling Liquid Software via continuous update flows.

The partnership with JFrog will enable RunSafe to supercharge binary protections via a simple plugin that JFrog users can deploy within their Artifactory repositories and instantly protect binaries and containers. As compiled binaries are dropped into Artifactory, Alkemist protections are automatically applied to each artifact, thus hardening 3rd party libraries and shared objects from cyber-attack.

"Given JFrog customers are focused on continuous, free-flowing development and deployment, we wanted to offer them a way to harden software binaries without slowing down developers or changing workflows," said Joe Saunders, CEO of RunSafe Security. "Alkemist is the only offering to harden software binaries with memory protections without changing functionality, performance, or overhead, making this integration a perfect fit all around."

"We're excited to partner with RunSafe so our customers now have the option to automatically reduce attack surfaces and enable secure continuous deployments," said Casey O'Mara, head of WW business development, JFrog. "With this integration, our users have the ability to deploy the Alkemist plugin to instantly start protecting native binaries and containers."

The RunSafe JFrog plugin is available immediately. For more information and to register for a free trial, visit https://www.runsafesecurity.com/jfrog

About RunSafe
RunSafe Security is on a mission to immunize software from cyber attacks and disrupt hacker economics without developer friction. RunSafe's patented technology, Alkemist, inoculates customers' systems from an entire class of cyber attacks by stopping the infection at its source. Our customers integrate our product across build and deploy toolchains to protect open source, in house code, and 3rd party binaries. Headquartered in McLean, Virginia, with an office in Huntsville, Alabama, RunSafe Security's customers span the critical infrastructure, IIoT, automotive, medical, devsecops and national security industries.

About JFrog
JFrog is on a mission to enable continuous updates through liquid software, empowering developers to code high-quality applications that securely flow to end-users with zero downtime. JFrog is the creator of Artifactory, the heart of the end-to-end Universal DevOps platform for automating, managing, securing, distributing, and monitoring all types of technologies. JFrog products are available as open-sourceon-premise, and on the cloud on AWSMicrosoft Azure, and Google Cloud. As a leading universal, highly available enterprise DevOps solution, the JFrog platform empowers customers with trusted and expedited software releases from code-to-production. JFrog is trusted by more than 5,600 customers, and top global brands depend on JFrog to manage their binaries for their mission-critical applications. JFrog is privately held with offices across North America, Europe, and Asia. Learn more at jfrog.com.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16275
PUBLISHED: 2020-08-10
A cross-site scripting (XSS) vulnerability in the Credential Manager component in SAINT Security Suite 8.0 through 9.8.20 could allow arbitrary script to run in the context of a logged-in user when the user clicks on a specially crafted link.
CVE-2020-16276
PUBLISHED: 2020-08-10
An SQL injection vulnerability in the Assets component of SAINT Security Suite 8.0 through 9.8.20 allows a remote, authenticated attacker to gain unauthorized access to the database.
CVE-2020-16277
PUBLISHED: 2020-08-10
An SQL injection vulnerability in the Analytics component of SAINT Security Suite 8.0 through 9.8.20 allows a remote, authenticated attacker to gain unauthorized access to the database.
CVE-2020-16278
PUBLISHED: 2020-08-10
A cross-site scripting (XSS) vulnerability in the Permissions component in SAINT Security Suite 8.0 through 9.8.20 could allow arbitrary script to run in the context of a logged-in user when the user clicks on a specially crafted link.
CVE-2020-15139
PUBLISHED: 2020-08-10
In MyBB before version 1.8.24, the custom MyCode (BBCode) for the visual editor doesn't escape input properly when rendering HTML, resulting in a DOM-based XSS vulnerability. The weakness can be exploited by pointing a victim to a page where the visual editor is active (e.g. as a post or Private Mes...