Blogs
Scantist Wins CSA Cybercall Innovation Award for the Second Time, Revolutionizing Secure Open-Source Supply Chains

Scantist Wins CSA Cybercall Innovation Award for the Second Time, Revolutionizing Secure Open-Source Supply Chains

Open Source
Published on
October 3, 2023

Scantist Wins CSA Cybercall Innovation Award

We are elated to announce that Scantist has again been honored with the prestigious Cybersecurity Agency (CSA) Cybercall Innovation Award. This year, we've received the award in the open category for our game-changing initiative: 'Secure Open-Source Supply Chain via AI-enabled patching'. This is not our first rodeo; we won the same accolade in 2020 for our 'AI-enabled Application Security Testing Framework'. We extend our heartfelt gratitude to CSA and the cybersecurity community for this significant recognition and ongoing support.

Caption: Josephine Teo, Guest-of-Honour, Minister for Communications and Information and Minister-in-Charge of Smart Nation and Cybersecurity, presented the Cybercall 2022 Innovator Award to Scantist. On stage, Scantist's COO Rohan Sood is accepting the award on behalf of Scantist.

Our latest project aims to transform the way developers interact with open-source software, specifically in terms of security. Today's developers often find themselves embroiled in the complicated process of identifying and remedying open-source security vulnerabilities, a challenge that our project directly addresses. Utilizing cutting-edge AI technology, we've developed an Automated Patch Engine that produces secure versions of open-source packages, which are then verified and distributed through our Secure Vault System.

Caption: Professor Liu Yang, C0-Founder Scantist, giving an interview to CNA at the Awards Ceremony  

Our approach is unique because it's the first to use AI and code-generating LLMs at scale for creating security-hardened open-source packages. This enables effortless mitigation of open-source security risks, a feature long overdue in the world of software development.

The benefits of this innovation are far-reaching. We estimate that our approach can save an average developer 150 hours each year. More critical is the drastic reduction in the mean time to remediation (MTTR) for open-source vulnerabilities, cutting it down to less than 7 days from the current 68 days.

We see this award as a collective win for all those who are part of the Scantist ecosystem and beyond. To keep the momentum going, we invite interested organizations to be our design partners or end users in this transformative journey. If you're intrigued by the possibilities, we would love to hear from you. Please reach out to contact@scantist.com for partnership opportunities.

Thank you for your support. Together, let's make the digital world a more secure place—one open-source package at a time.

Related Blogs

Find out how we’ve helped organisations like you

PAIStrike vs. DVWA - A Technical Deep Dive into Autonomous Attack Chains

In Part 1 of our series, we introduced the results of PAIStrike’s controlled benchmark against the Damn Vulnerable Web Application (DVWA), where it identified 18 high-confidence vulnerabilities. But the real story isn’t just the number of findings—it’s how they were discovered.

PAIStrike vs. DVWA - A New Benchmark for Autonomous Security Validation

This document contains a 3-part blog series rewriting the DVWA benchmark showcase based on the new validation report, complete with corresponding social media posts.

Redefining Automated Pentesting: PAIStrike Achieves L3 Capability with 100% Success on Stateful Attacks

PAIStrike is proud to answer that call with the results of its latest engine optimization on the rigorous, public XBEN benchmark. These results not only validate PAIStrike's performance but signal a fundamental shift in the maturity of automated penetration testing, confirming our transition to a true Stateful Automated Attack Engine.