Supply Chain Security 101

Everything you need to know about software supply chain security
in the age of open source.

Software Supply Chain

A Practical Guide to Migrating Helm Charts from Bitnami

September 24, 2025

Learn more about the changes coming to Bitnami Helm charts after September 29, 2025, and how Chainguard can support your team with our first-party Helm Charts.

DevSecOpsSoftware Supply Chain

What is Software Composition Analysis (SCA)?

September 15, 2025

Learn what software composition analysis (SCA) is, and what makes it a powerful security testing solution to secure your supply chain.

DevSecOpsSoftware Supply Chain

Top 7 Docker security risks and best practices

September 12, 2025

Learn about the security risks and challenges Docker containers pose, and best practices for keeping containerized workloads safe.

DevSecOps

What is code signing?

September 10, 2025

Learn what code signing is, how it helps verify artifacts, and why it’s critical to establishing a more secure software supply chain.

Tools & Buyer’s GuidesSoftware Supply Chain

Container Security Tools: A buyer’s guide

September 1, 2025

Explore container security tools, their features, and how to choose the right mix to secure modern cloud-native applications and infrastructure.

Software Supply ChainDevSecOps

Container Hardening: Securing your software supply chain

August 29, 2025

Learn container hardening best practices to secure your software supply chain. Reduce CVEs, meet compliance requirements, and automate security.

Compliance

FIPS 140-3: Everything you need to know

August 22, 2025

Learn what FIPS 140-3 is, how it differs from 140-2, who must comply, and how to simplify cryptographic validation for modern, regulated software.

Compliance

FIPS 140-2 Explained: The engineer’s guide to compliance

August 21, 2025

FIPS 140-2 compliance is complex and high-stakes. Learn what it is, who needs it, and how Chainguard makes meeting and maintaining compliance simple.

Compliance

What is FIPS?

August 19, 2025

Learn what FIPS compliance requires, who it applies to, and how to meet standards like FIPS 140-2 and 140-3 in modern software environments.

Software Supply ChainAppSec

How to prevent software supply chain attacks

August 15, 2025

Learn about what supply chain attacks are, real-world examples like SolarWinds and XZ Utils, and strategies to prevent them with layered security.

Software Supply ChainAppSec

Understanding software supply chain security

August 8, 2025

Learn what software supply chain security is, plus tools and best practices to protect your org from vulnerabilities and other risks.

Software Supply ChainDevSecOps

Docker Images vs Containers: Key differences

August 7, 2025

Learn about Docker images and containers, how they work, and the key differences between them.

AppSecDevSecOps

What is vulnerability scanning, and how does it work?

August 6, 2025

Learn what vulnerability scanning is and how scanners relate to CVEs and malware.

ComplianceAppSec

NIST Cybersecurity Framework: Core functions and best practices

August 5, 2025

Discover the NIST Cybersecurity Framework (CSF) and explore its core principles and recommended best practices in CSF 2.0.

Software Supply ChainDevSecOps

What is a Docker image?

August 1, 2025

Learn what a Docker image is, what role it plays in modern application development in containers, and how to build and secure Docker images.

ComplianceAppSec

What is NIS2?

July 29, 2025

Learn what NIS2 is, who must comply, its cybersecurity measures, and how to update controls and practices to meet compliance.

Want to learn more about Chainguard?

Get info on our customized pricing plans or request a demo tailored to your team's workflows.

Let's Chat