{"id":49053,"date":"2022-09-29T16:10:05","date_gmt":"2022-09-29T20:10:05","guid":{"rendered":"https:\/\/sdtimes.com\/?p=49053"},"modified":"2022-09-29T16:10:05","modified_gmt":"2022-09-29T20:10:05","slug":"ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security","status":"publish","type":"post","link":"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/","title":{"rendered":"Ox Security emerges from stealth with $34M to provide end-to-end software supply chain security"},"content":{"rendered":"<p dir=\"ltr\">Tel Aviv, Israel, September 29, 2022 \u2014 <a href=\"https:\/\/mailtrack.io\/trace\/link\/938efbc1930b0cf0c68041477abe0cb383811583?url=https%3A%2F%2Fwww.ox.security%2F&amp;userId=7791813&amp;signature=5de1a01469dec6ae\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/mailtrack.io\/trace\/link\/938efbc1930b0cf0c68041477abe0cb383811583?url%3Dhttps%253A%252F%252Fwww.ox.security%252F%26userId%3D7791813%26signature%3D5de1a01469dec6ae&amp;source=gmail&amp;ust=1664568294428000&amp;usg=AOvVaw35AVSV_9V5HXDBc7Ax2sZD\">Ox Security<\/a>, the end-to-end software supply chain security platform for DevSecOps, exited stealth today with $34M in funding led by Evolution Equity Partners, Team8, and M12, Microsoft\u2019s venture fund, with participation from Rain Capital. OX was founded less than a year ago by Neatsun Ziv and Lior Arzi, two top Check Point executives. Its platform is already used by over 30 leading companies to secure their software supply chains, including Kaltura and Bloomreach.<\/p>\n<p dir=\"ltr\">The rise in software supply chain attacks, like the SolarWinds hack, prompted last year\u2019s <a href=\"https:\/\/mailtrack.io\/trace\/link\/53a6c693cc20fab28da55e566a9deb149235b763?url=https%3A%2F%2Fwww.whitehouse.gov%2Fbriefing-room%2Fpresidential-actions%2F2021%2F05%2F12%2Fexecutive-order-on-improving-the-nations-cybersecurity%2F&amp;userId=7791813&amp;signature=fe9fc13c12844419\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/mailtrack.io\/trace\/link\/53a6c693cc20fab28da55e566a9deb149235b763?url%3Dhttps%253A%252F%252Fwww.whitehouse.gov%252Fbriefing-room%252Fpresidential-actions%252F2021%252F05%252F12%252Fexecutive-order-on-improving-the-nations-cybersecurity%252F%26userId%3D7791813%26signature%3Dfe9fc13c12844419&amp;source=gmail&amp;ust=1664568294428000&amp;usg=AOvVaw0b87qMLfssY1V05jNumvd6\">executive order<\/a> requiring vendors to provide a software bill of materials (SBOM). This software \u201cingredients list\u201d can help security teams understand if a newly disclosed vulnerability impacts them. However, industry <a href=\"https:\/\/mailtrack.io\/trace\/link\/0f1405ddbcaf8b2c8d6173b2088c2e5693841d01?url=https%3A%2F%2Fwww.linkedin.com%2Fpulse%2Fsbom-good-intentions-bad-analogies-uglyoutcomes-alex-gantman%2F&amp;userId=7791813&amp;signature=550ca97bfa09ee21\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/mailtrack.io\/trace\/link\/0f1405ddbcaf8b2c8d6173b2088c2e5693841d01?url%3Dhttps%253A%252F%252Fwww.linkedin.com%252Fpulse%252Fsbom-good-intentions-bad-analogies-uglyoutcomes-alex-gantman%252F%26userId%3D7791813%26signature%3D550ca97bfa09ee21&amp;source=gmail&amp;ust=1664568294428000&amp;usg=AOvVaw3_dXvMaLJ-64xtrIoH0kId\">experts caution<\/a> that it isn\u2019t comprehensive enough to prevent attacks or address the challenges of securing today\u2019s dynamic software supply chains.<\/p>\n<p dir=\"ltr\">\u201cThe introduction of SBOM is an important step, however, it isn\u2019t sufficient to ensure the security and integrity of software supply chains,\u201d said Admiral Mike Rogers, former director of the NSA. \u201cRecent high-profile breaches \u2014 like those that affected SolarWinds, Codecov and\u00a0 Log4j \u2014 could not have been detected or prevented with the static list of software components contained in an SBOM. There\u2019s a real risk of providing a false sense of protection by having a standard for compliance that does not equate to security.\u201d<\/p>\n<p dir=\"ltr\">To address these issues, OX is developing a new open standard, PBOM, in collaboration with leading cybersecurity-conscious companies. The Pipeline Bill of Materials (PBOM) includes within it the SBOM but goes further, covering not only the code in the final product but also the procedures and processes that impacted the software throughout its development. OX and its partners undertook extensive research on the root causes of more than 70 attacks from the past year. They specifically designed the PBOM to contain the information that would have been needed to prevent each of the recent attacks.<\/p>\n<p dir=\"ltr\">OX\u2019s platform is the first product using the PBOM standard to provide end-to-end software supply chain security, allowing it to cover every step of the development pipeline, from the earliest planning stages until deployment to production. OX seamlessly integrates with existing tools and infrastructure to monitor and record every action affecting software throughout the entire development lifecycle. It gives security and DevOps teams complete visibility and control over the attack surface, including source code, pipeline, artifacts, container images, runtime assets, and applications.<\/p>\n<p dir=\"ltr\">\u201cDevelopers and DevOps make constant changes to the software supply chain, adding new tools, open source components and SaaS services,\u201d said Neatsun Ziv, OX\u2019s CEO and co-founder. \u201cThe OX platform gives DevSecOps teams real-time, end-to-end visibility into all aspects that impact software through the entire pipeline, so they have the necessary context and control to ensure security.\u201d<\/p>\n<p dir=\"ltr\">OX connects to an organization&#8217;s code repository and performs a scan of the environment from code to cloud, to automatically produce a full mapping of assets, apps and pipelines. OX identifies which security tools are in use, verifies they\u2019re all connected and operational, and determines if additional tools are necessary. Following the scan, OX presents any security issues that were found, prioritized by their business impact, alongside context, automated fixes and recommendations, empowering DevSecOps teams to tackle their cybersecurity backlog. A PBOM, which includes an SBOM, version lineage, SaaSBOM, build hashes and more, can be automatically generated and shared with internal stakeholders or customers, so they in turn can verify that the software they use is derived from trusted, secure builds.<\/p>\n<p dir=\"ltr\">&#8220;Ox Security is tackling a critical challenge facing companies today, and are uniquely positioned to become leaders in their space,&#8221; said Nadav Zafrir, Managing Partner at Team8 Group and former head of Israel&#8217;s elite intelligence Unit 8200. &#8220;We are thrilled to join forces with Neatsun and Lior. The ground-breaking PBOM standard enables OX\u2019s platform to provide unparalleled security coverage and I have no doubt that PBOM will be widely adopted across the industry.\u201d<\/p>\n<p>Additional quotes:<\/p>\n<p dir=\"ltr\">\u201cSupply chain attacks are on the rise, and the attack surface is growing,\u201d said Mony Hassid, Managing Partner at M12, Microsoft\u2019s venture fund. \u201cWhen it comes to software security and integrity, you have to look beyond which components were used and consider the overall security posture throughout the development process. Ox Security is pioneering a standard that will be transformative for supply chain security. We&#8217;re proud to work with OX to improve software security.\u201d<\/p>\n<p dir=\"ltr\">\u201cThe cybersecurity industry has been playing catch-up so far by pursuing a never-ending process of patching production environments and chasing alerts, issues and fixes,\u201d said Karthik Subramanian, General Partner at Evolution Equity Partners. \u201cOX\u2019s groundbreaking approach brings control back to DevSecOps teams by providing visibility and complete control over an organization\u2019s code. The level of innovation in OX\u2019s platform is truly remarkable and provides value to everyone in an organization \u2014 from developers to DevSecOps teams to executives.\u201d<\/p>\n<p dir=\"ltr\">\u201cI believe the PBOM standard will reverse the tide,\u201d said Mario Duarte, Vice-President of Security at Snowflake. \u201cI am proud to take part in a project that can have such a major impact on the future security landscape, and to share our knowledge and expertise.\u201d<\/p>\n<p dir=\"ltr\">&#8220;OX is truly changing how software supply chains are protected, ensuring that all code comes from secure and trusted builds,&#8221; said Naor Penso, Senior Director of Product Security at leading applied analytics company FICO. &#8220;The OX platform prevents software supply chain attacks while accelerating and streamlining development. The PBOM framework created by OX, expands the traditional SBOM with contextual knowledge and true end-to-end lineage that drives assurance in software security across its entire life-cycle.<\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>Tel Aviv, Israel, September 29, 2022 \u2014 Ox Security, the end-to-end software supply chain security platform for DevSecOps, exited stealth today with $34M in funding led by Evolution Equity Partners, Team8, and M12, Microsoft\u2019s venture fund, with participation from Rain Capital. OX was founded less than a year ago by Neatsun Ziv and Lior Arzi,  &hellip; <a class=\"read-more\" href=\"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/\">continue reading<\/a><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":540,"featured_media":49054,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"cybocfi_hide_featured_image":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[834],"tags":[8749,16329,15730,45,11243],"coauthors":[11463],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ox Security emerges from stealth with $34M to provide end-to-end software supply chain security - SD Times<\/title>\n<meta name=\"description\" content=\"The company also announced its collaboration with leading cyber-security conscious enterprises to create an open standard for verifying the security of software throughout the entire development process\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ox Security emerges from stealth with $34M to provide end-to-end software supply chain security - SD Times\" \/>\n<meta property=\"og:description\" content=\"The company also announced its collaboration with leading cyber-security conscious enterprises to create an open standard for verifying the security of software throughout the entire development process\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/\" \/>\n<meta property=\"og:site_name\" content=\"SD Times\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SDTimesD2\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-29T20:10:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/09\/See-everything-that-affects-your-software.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"SD Times Newswire\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:site\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SD Times Newswire\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/\"},\"author\":{\"name\":\"SD Times Newswire\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/240a506455bc7348e333d46c768417fa\"},\"headline\":\"Ox Security emerges from stealth with $34M to provide end-to-end software supply chain security\",\"datePublished\":\"2022-09-29T20:10:05+00:00\",\"dateModified\":\"2022-09-29T20:10:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/\"},\"wordCount\":951,\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/09\/See-everything-that-affects-your-software.jpeg\",\"keywords\":[\"DevSecOps\",\"Ox Security\",\"SBOM\",\"security\",\"supply chain\"],\"articleSection\":[\"NewsWire\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/\",\"url\":\"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/\",\"name\":\"Ox Security emerges from stealth with $34M to provide end-to-end software supply chain security - SD Times\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/09\/See-everything-that-affects-your-software.jpeg\",\"datePublished\":\"2022-09-29T20:10:05+00:00\",\"dateModified\":\"2022-09-29T20:10:05+00:00\",\"description\":\"The company also announced its collaboration with leading cyber-security conscious enterprises to create an open standard for verifying the security of software throughout the entire development process\",\"breadcrumb\":{\"@id\":\"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/#primaryimage\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/09\/See-everything-that-affects-your-software.jpeg\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/09\/See-everything-that-affects-your-software.jpeg\",\"width\":1800,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sdtimes.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ox Security emerges from stealth with $34M to provide end-to-end software supply chain security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sdtimes.com\/#website\",\"url\":\"https:\/\/sdtimes.com\/\",\"name\":\"SD Times\",\"description\":\"Software Development News\",\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sdtimes.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sdtimes.com\/#organization\",\"name\":\"SD Times\",\"url\":\"https:\/\/sdtimes.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"width\":225,\"height\":90,\"caption\":\"SD Times\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SDTimesD2\",\"https:\/\/x.com\/sdtimes\",\"https:\/\/www.linkedin.com\/company\/sdtimes\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/240a506455bc7348e333d46c768417fa\",\"name\":\"SD Times Newswire\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/image\/cee3d7d76ccaa394988ec9eb1fe61685\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/69da3ec9ff1b614a46d85a6460c3a05d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/69da3ec9ff1b614a46d85a6460c3a05d?s=96&d=mm&r=g\",\"caption\":\"SD Times Newswire\"},\"url\":\"https:\/\/sdtimes.com\/author\/sd-times-newswire\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ox Security emerges from stealth with $34M to provide end-to-end software supply chain security - SD Times","description":"The company also announced its collaboration with leading cyber-security conscious enterprises to create an open standard for verifying the security of software throughout the entire development process","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/","og_locale":"en_US","og_type":"article","og_title":"Ox Security emerges from stealth with $34M to provide end-to-end software supply chain security - SD Times","og_description":"The company also announced its collaboration with leading cyber-security conscious enterprises to create an open standard for verifying the security of software throughout the entire development process","og_url":"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/","og_site_name":"SD Times","article_publisher":"https:\/\/www.facebook.com\/SDTimesD2","article_published_time":"2022-09-29T20:10:05+00:00","og_image":[{"width":1800,"height":1200,"url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/09\/See-everything-that-affects-your-software.jpeg","type":"image\/jpeg"}],"author":"SD Times Newswire","twitter_card":"summary_large_image","twitter_creator":"@sdtimes","twitter_site":"@sdtimes","twitter_misc":{"Written by":"SD Times Newswire","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/#article","isPartOf":{"@id":"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/"},"author":{"name":"SD Times Newswire","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/240a506455bc7348e333d46c768417fa"},"headline":"Ox Security emerges from stealth with $34M to provide end-to-end software supply chain security","datePublished":"2022-09-29T20:10:05+00:00","dateModified":"2022-09-29T20:10:05+00:00","mainEntityOfPage":{"@id":"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/"},"wordCount":951,"publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"image":{"@id":"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/09\/See-everything-that-affects-your-software.jpeg","keywords":["DevSecOps","Ox Security","SBOM","security","supply chain"],"articleSection":["NewsWire"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/","url":"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/","name":"Ox Security emerges from stealth with $34M to provide end-to-end software supply chain security - SD Times","isPartOf":{"@id":"https:\/\/sdtimes.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/#primaryimage"},"image":{"@id":"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/09\/See-everything-that-affects-your-software.jpeg","datePublished":"2022-09-29T20:10:05+00:00","dateModified":"2022-09-29T20:10:05+00:00","description":"The company also announced its collaboration with leading cyber-security conscious enterprises to create an open standard for verifying the security of software throughout the entire development process","breadcrumb":{"@id":"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/#primaryimage","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/09\/See-everything-that-affects-your-software.jpeg","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/09\/See-everything-that-affects-your-software.jpeg","width":1800,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/sdtimes.com\/supply-chain-security\/ox-security-emerges-from-stealth-with-34m-to-provide-end-to-end-software-supply-chain-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sdtimes.com\/"},{"@type":"ListItem","position":2,"name":"Ox Security emerges from stealth with $34M to provide end-to-end software supply chain security"}]},{"@type":"WebSite","@id":"https:\/\/sdtimes.com\/#website","url":"https:\/\/sdtimes.com\/","name":"SD Times","description":"Software Development News","publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sdtimes.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sdtimes.com\/#organization","name":"SD Times","url":"https:\/\/sdtimes.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","width":225,"height":90,"caption":"SD Times"},"image":{"@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SDTimesD2","https:\/\/x.com\/sdtimes","https:\/\/www.linkedin.com\/company\/sdtimes\/"]},{"@type":"Person","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/240a506455bc7348e333d46c768417fa","name":"SD Times Newswire","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/image\/cee3d7d76ccaa394988ec9eb1fe61685","url":"https:\/\/secure.gravatar.com\/avatar\/69da3ec9ff1b614a46d85a6460c3a05d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/69da3ec9ff1b614a46d85a6460c3a05d?s=96&d=mm&r=g","caption":"SD Times Newswire"},"url":"https:\/\/sdtimes.com\/author\/sd-times-newswire\/"}]}},"_links":{"self":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/49053"}],"collection":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/users\/540"}],"replies":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/comments?post=49053"}],"version-history":[{"count":1,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/49053\/revisions"}],"predecessor-version":[{"id":49055,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/49053\/revisions\/49055"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media\/49054"}],"wp:attachment":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media?parent=49053"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/categories?post=49053"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/tags?post=49053"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/coauthors?post=49053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}