Overview
            
                
                    
                        An Introduction to Cosign
                        
                            
                        
                    
                    
                        
                            
                        
                    
                    
                        
                            
                        
                    
                    
                        
                            
                        
                    
                    
                        
                            
                        
                    
                    
                        
                            
                        
                    
                    
                        
                            
                        
                    
                    
                        
        Understanding Cosign, a project under Sigstore
                    
                
                    
                        What Are Software Vulnerabilities and CVEs?
                        An introduction to software vulnerabilities and vulnerability documentation through the CVE Program
                    
                
                    
                        An Introduction to Rekor
                        Understanding Rekor, the transparency log of Rekor
                    
                
                    
                        Why Care About Software Vulnerabilities?
                        An overview of software vulnerability impacts and the significance of CVEs in vulnerability management practices
                    
                
                    
                        Infamous Software Vulnerabilities
                        An overview a few of the most critical, widespread, and impactful known software vulnerabilities
                    
                
                    
                        Software Vulnerability Remediation
                        A step-by-step guide on beginning to triage and remediate vulnerabilities in your software
                    
                
                    
                        Using Custom Identity Providers to Authenticate to Chainguard
                        An introduction to and overview of Chainguard's custom IDP support features
                    
                
                
    
            
          
