Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Phylum Adds OPA for Open Source Analysis

April 21, 2023
Reading Time: 2 mins read
in News

 

Software supply chain security firm Phylum has integrated the Open Policy Agent (OPA) into its risk analysis engine, giving security teams more flexibility in creating and enforcing custom policies on the use of open-source software.

The engine provides greater visibility into the development lifecycle and analyses every bit of information about open-source packages, including the code, authors, OSINT, metadata and software supply chain risk.

This results in a risk analysis, rather than a vulnerability scan of the open-source software code, with advice provided on how to consume and use open-source packages effectively and safely based on an organization’s specific threat model.

The advantage of automating risk analysis in open-source software is that it can delve deeper into dependencies with greater efficiency and speed than can be achieved manually. For example, the popular React package has thousands of dependencies, each of which defines further additional dependencies it needs.

Even the developer of React cannot control the complete dependency graph, so the risk could be introduced from any of these layers. While many developers are aware of the dependency issue, they cannot realistically examine the entire dependency graph, as it would take months, and by the time they finish, 25% of the dependencies will have changed.

Phylum’s engine provides complete risk analysis of open-source packages, including their dependencies, with the addition of OPA adding significant granularity to policies. The platform comes equipped with a default policy that detects risks across five domains, including software vulnerabilities, license misuse, OSS malware, author risk and reputation, and engineering risk, and blocks attacks.

The default policy also allows organizations to comply with software supply chain security regulations in NIST, ISO and more. Leveraging OPA, users with more specific requirements can easily write custom policies as needs evolve, and policy enforcement significantly limits risk and reduces remediation efforts, while continuous reporting allows organizations to document their security posture on an ongoing basis.

Reference:
  • Phylum Adds Open Policy Agent (OPA) and Continuous Reporting

Tags: April 2023Cyber NewsCyber News 2023OPAopen sourcePhylumSoftware
ADVERTISEMENT

Related Posts

Employees Keep Feeding AI Secrets

Signal Adds Secure Cloud Backups

September 9, 2025
Employees Keep Feeding AI Secrets

Spamgpt AI Tool Powers Phishing Attack

September 9, 2025
Employees Keep Feeding AI Secrets

Employees Keep Feeding AI Secrets

September 9, 2025
Maduro Claims Huawei Phone Cannot Be Hacked

Police Disrupts Streameast Piracy Site

September 9, 2025
Maduro Claims Huawei Phone Cannot Be Hacked

Texas Sues PowerSchool Over Data Breach

September 9, 2025
Maduro Claims Huawei Phone Cannot Be Hacked

Maduro Claims Huawei Phone Cannot Be Hacked

September 9, 2025

Latest Alerts

Windows Defender Flaw Enables Hijack

Npm Packages Compromised In Attack

GPUGate Abuse of Google Ads and GitHub

iCloud Calendar Used For Phishing Emails

Czech Cyber Agency Warns On Chinese Tech

Atomic Stealer Masquerades As Cracked App

Subscribe to our newsletter

    Latest Incidents

    Hackers Steal Secrets In GitHub Attack

    Plex Users Told To Reset Passwords

    Lovesac Confirms Breach After Attack

    Azure Cloud Hit By Red Sea Cable Cuts

    Tenable Confirms Breach Of Customer Data

    US Probes Malicious Email On China Talks

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial