Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Phylum Adds OPA for Open Source Analysis

April 21, 2023
Reading Time: 2 mins read
in News

 

Software supply chain security firm Phylum has integrated the Open Policy Agent (OPA) into its risk analysis engine, giving security teams more flexibility in creating and enforcing custom policies on the use of open-source software.

The engine provides greater visibility into the development lifecycle and analyses every bit of information about open-source packages, including the code, authors, OSINT, metadata and software supply chain risk.

This results in a risk analysis, rather than a vulnerability scan of the open-source software code, with advice provided on how to consume and use open-source packages effectively and safely based on an organization’s specific threat model.

The advantage of automating risk analysis in open-source software is that it can delve deeper into dependencies with greater efficiency and speed than can be achieved manually. For example, the popular React package has thousands of dependencies, each of which defines further additional dependencies it needs.

Even the developer of React cannot control the complete dependency graph, so the risk could be introduced from any of these layers. While many developers are aware of the dependency issue, they cannot realistically examine the entire dependency graph, as it would take months, and by the time they finish, 25% of the dependencies will have changed.

Phylum’s engine provides complete risk analysis of open-source packages, including their dependencies, with the addition of OPA adding significant granularity to policies. The platform comes equipped with a default policy that detects risks across five domains, including software vulnerabilities, license misuse, OSS malware, author risk and reputation, and engineering risk, and blocks attacks.

The default policy also allows organizations to comply with software supply chain security regulations in NIST, ISO and more. Leveraging OPA, users with more specific requirements can easily write custom policies as needs evolve, and policy enforcement significantly limits risk and reduces remediation efforts, while continuous reporting allows organizations to document their security posture on an ongoing basis.

Reference:
  • Phylum Adds Open Policy Agent (OPA) and Continuous Reporting

Tags: April 2023Cyber NewsCyber News 2023OPAopen sourcePhylumSoftware
ADVERTISEMENT

Related Posts

US Seizes $225M In Record Crypto Bust

UK Data Law Risks EU Adequacy Deal

June 20, 2025
US Seizes $225M In Record Crypto Bust

US Seizes $225M In Record Crypto Bust

June 20, 2025
US Seizes $225M In Record Crypto Bust

Argentina Busts Russian Disinformation Ring

June 20, 2025
Iran Slows Internet to Prevent Cyberattacks

Episource data breach affects over 5M patients

June 19, 2025
Iran Slows Internet to Prevent Cyberattacks

Ryuk ransomware’s access enabler extradited

June 19, 2025
Iran Slows Internet to Prevent Cyberattacks

Iran Slows Internet to Prevent Cyberattacks

June 19, 2025

Latest Alerts

Winos 4.0 Malware Hits Taiwan Via Tax Phish

New Amatera Stealer Delivered By ClearFake

New Godfather Trojan Hijacks Banking Apps

Fake Minecraft Mods On GitHub Spread Malware

Fake Invoices Deliver Sorillus RAT In Europe

Russian Phishing Scam Bypasses Google 2FA

Subscribe to our newsletter

    Latest Incidents

    Massive Leak Exposes 16 Billion Credentials

    Tonga Health System Down After Ransomware

    Chinese Spies Target Satellite Giant Viasat

    German Dealer Leymann Hacked Closes Stores

    Hacker Mints $27M From Meta Pool Gets 132K

    UBS and Pictet Hit By Vendor Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial