Cloudsmith Blog

Featured
Supply chain security
5 min read

7 Key Metrics to Measure Software Supply Chain Security

As software supply chain attacks evolve, security teams need more than frameworks, they need measurable proof. This post breaks down seven key software supply chain security metrics that reveal real S2C2F maturity, from artifact provenance and SBOM freshness to policy enforcement and vulnerability response speed…
Supply chain security
4 min read

How Artifact Management Enables S2C2F Maturity

Artifact management plays a critical role in achieving S2C2F maturity. Learn how secure artifact repositories strengthen software supply chain integrity and enable trusted, verifiable builds at scale…
Best Practices
4 min read

Authenticate to Cloudsmith with your AWS identity

Implement secure OIDC authentication between AWS STS and Cloudsmith to eliminate long-lived environment secrets. Discover how to configure outbound identity federation for automated token exchange…
Series
Keep up to date with our monthly newsletter

By submitting this form, you agree to our privacy policy