Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Phylum Adds OPA for Open Source Analysis

April 21, 2023
Reading Time: 2 mins read
in News

 

Software supply chain security firm Phylum has integrated the Open Policy Agent (OPA) into its risk analysis engine, giving security teams more flexibility in creating and enforcing custom policies on the use of open-source software.

The engine provides greater visibility into the development lifecycle and analyses every bit of information about open-source packages, including the code, authors, OSINT, metadata and software supply chain risk.

This results in a risk analysis, rather than a vulnerability scan of the open-source software code, with advice provided on how to consume and use open-source packages effectively and safely based on an organization’s specific threat model.

The advantage of automating risk analysis in open-source software is that it can delve deeper into dependencies with greater efficiency and speed than can be achieved manually. For example, the popular React package has thousands of dependencies, each of which defines further additional dependencies it needs.

Even the developer of React cannot control the complete dependency graph, so the risk could be introduced from any of these layers. While many developers are aware of the dependency issue, they cannot realistically examine the entire dependency graph, as it would take months, and by the time they finish, 25% of the dependencies will have changed.

Phylum’s engine provides complete risk analysis of open-source packages, including their dependencies, with the addition of OPA adding significant granularity to policies. The platform comes equipped with a default policy that detects risks across five domains, including software vulnerabilities, license misuse, OSS malware, author risk and reputation, and engineering risk, and blocks attacks.

The default policy also allows organizations to comply with software supply chain security regulations in NIST, ISO and more. Leveraging OPA, users with more specific requirements can easily write custom policies as needs evolve, and policy enforcement significantly limits risk and reduces remediation efforts, while continuous reporting allows organizations to document their security posture on an ongoing basis.

Reference:
  • Phylum Adds Open Policy Agent (OPA) and Continuous Reporting

Tags: April 2023Cyber NewsCyber News 2023OPAopen sourcePhylumSoftware
ADVERTISEMENT

Related Posts

Romanian Swatter Guilty For US Leader Hoaxes

Romanian Swatter Guilty For US Leader Hoaxes

June 4, 2025
Romanian Swatter Guilty For US Leader Hoaxes

Germany Fines Vodafone $51M For Data Flaws

June 4, 2025
Romanian Swatter Guilty For US Leader Hoaxes

Chrome To Distrust Two More CA Certificates

June 4, 2025
New CISA Budget Slashes Staff And Funds

New CISA Budget Slashes Staff And Funds

June 3, 2025
New CISA Budget Slashes Staff And Funds

Microsoft and CrowdStrike Align Hacker Names

June 3, 2025
New CISA Budget Slashes Staff And Funds

Aussie Ransom Reporting Rules Now In Effect

June 3, 2025

Latest Alerts

Bogus CAPTCHA Lures Install NetSupport RAT

Crocodilus Trojan Steals Crypto Globally

Fake RubyGems Steal Telegram Bot Tokens

Fake FB Ban Fix Extension Steals Accounts

Actively Exploited Chrome V8 Flaw Patched

DevOps Servers Hit By JINX0132 Crypto Mine

Subscribe to our newsletter

    Latest Incidents

    Malaysia Home Minister WhatsApp Breached

    MainStreet Bank Faces Vendor Data Breach

    BitoPro Loses $11.5M In DeFi Hack Wave

    Cartier Data Breach Exposes Client Info

    White House Chief of Staff’s Phone Hacked

    The North Face Hit By 4th Credential Hack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial