Featured Blog iage
Keep up with the latest updates from Arnica
Subscribe to our newsletter for updates
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Sign-up to our RSS feeds
Announcements
Blog
Press
All Posts
Announcements
Blog
Press
Help
External link icon
Feature Announcement: Software bill of materials (SBOM)
November 15, 2022
We launched Arnica today. Here is our story.
October 24, 2022
Feature Announcement: Anomalous Developer Behavior | Arnica
October 13, 2022
Feature Announcement: Secret Detection & Mitigation | Arnica
October 13, 2022
Feature Announcement: Automated Developer Permissions Management | Arnica
September 14, 2022
One-click risk mitigations
September 8, 2022
Post image
Harnessing the Power of Secure Coding Practices for Effective CI/CD Security
February 14, 2023
Post image
Best practices for securing your development ecosystem
January 11, 2023
Post image
Azure Permissions: Managing Granular Permissions in Azure Devops
January 10, 2023
Post image
Security to-do lists slow you down, security tools need to fix the problems they find
December 14, 2022
Post image
GitHub Hosted vs. Self-Hosted Runners: Which One Should You Choose?
November 8, 2022
Post image
What to Consider Before Enforcing Multi-Factor Authentication on GitHub
October 19, 2022
Post image
Trouble Keeping Track of Your Keys? So Does Toyota: Lessons Learned from a Key Management Breach
October 12, 2022
Post image
Hardening Your Software Development Environment: A Beginner's Guide
September 21, 2022
Post image
Four takeaways from the NSA's software supply chain security recommendations
September 10, 2022
Post image
Analyzing LastPass' Recent Security Incident Notification
August 26, 2022
Post image
Demystifying the Pl0x GitHub attack
August 17, 2022
Post image
GitHub CODEOWNERS: What Every Developer Should Know
July 23, 2022
Post image
Protecting Stale Code Repositories on GitHub: Essential Security Measures
July 18, 2022
Post image
Hacking Upstream: Finding a 0-Day in an OpenSSH Key Parser Library
July 6, 2022
Post image
GitGoat: An Open Source Project of Intentionally (Riskless) Misconfigured GitHub Organizations
June 27, 2022
Post image
Tracing the Impact of a Clothing Retailer's Software Supply Chain Breach on Your Production Environment
May 25, 2022
Post image
The Importance of Free Secret Detection, Even for Private Repositories
May 11, 2022
Post image
Github OAuth Apps Security: How to protect yourself against GitHub/OAuth Apps Supply Chain Attacks
April 16, 2022
Post image
How to Survive a State Actor's Attempt to Put a Backdoor in Your Code
March 7, 2022
Post image
Application Security vs. Software Supply Chain Security: What's the Difference?
February 27, 2022
Post image
How Top Open Source Projects Protect Their Code: Insights and Best Practices
February 7, 2022
Post image
Afraid of your source code leaking? I can tell by the Twitch in your eye…!
January 4, 2022
Post image
Hacking Hacker News: Lessons Learned from a Security Researcher Wearing A Growth Hat
January 4, 2022
Developers Extension Security Team: A New Approach to Ensuring Secure Code
March 1, 2023
Best Secure software development solutions: our top picks
January 9, 2023
Interview with Nir Veltman – Arnica
November 21, 2022
Securing the Modern Software Supply Chain
November 9, 2022
Arnica raises $7M to improve software supply chain security
October 31, 2022
Arnica raises $7 million to secure software supply chain
October 26, 2022
Atlanta startup Arnica raises $7M as it enters growing cybersecurity market
October 26, 2022
How Arnica’s tool keeps supply chain and developers flowing by repelling attacks
October 25, 2022
With $7M in funding, Arnica is using behavioral analytics to spot hackers posing as developers
October 25, 2022
Arnica raises $7M to secure software supply chains with behavior-based threat detection and least-privilege enablement
October 25, 2022
Arnica Raises $7 Million to Protect Software Developers, Code
October 25, 2022
Interview with Nir Valtman, CEO and Founder of Arnica
October 11, 2022
Enhancing the Security of the Software Supply Chain through Secure Software Development Practices
September 14, 2022
Biden issues Executive Order to strengthen nation’s cybersecurity networks
May 13, 2021
Cybersecurity 101: Protect your privacy from hackers, spies, and the government
January 21, 2021