Blog Adam Murray

Adam Murray

Writes about open source security and risk mitigation.
Secure Coding: A Practical Guide -

Secure Coding: A Practical Guide

Learn about the importance of secure coding in software development. Discover practical tips and principles to ensure your code is secure.

Read More
Secure Coding: A Practical Guide - scanners2

Advance From Open Source Code Scanner to Software Composition Analysis Solution

Discover why it's essential to advance from open source code scanners to software composition analysis solutions. Learn about the pitfalls of outdated scanners and the benefits of modern tools.

Read More
Secure Coding: A Practical Guide - 100 Million Court Case For Open Source License Compliance post

The $100 Million Court Case for Open Source License Compliance

Discover the $100 million court case for open source license compliance between CoKinetic Systems and Panasonic.

Read More
Secure Coding: A Practical Guide - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlY2U2NjEwYzViM2UucG5nJnZlcnNpb249MDAwMCZzaWc9ZDY2MTY1NjRjYzRhZTA3OWFmNGM4MmVmZThlMTk5NzI

Forrester’s State of Application Security, 2020: Key Takeaways

Discover Forrester’s key findings on application security in 2020. Learn why app vulnerabilities are a major threat and how to strengthen your security practices.

Read More
Secure Coding: A Practical Guide - gdpr

How Does GDPR Impact Open Source Security Expectations?

Learn about how GDPR impacts open source security expectations and the importance of using automated Software Composition Analysis tools to ensure compliance and protect user data.

Read More
Secure Coding: A Practical Guide - devsecops vs secdevops post

DevSecOps vs. SecDevOps: A Rose by Any Other Name?

Explore the difference between DevSecOps and SecDevOps. Learn how security practices have evolved in the software development life cycle.

Read More
Secure Coding: A Practical Guide -

May Open Source Security Vulnerabilities Snapshot

Stay up to date with May's open source security vulnerabilities. Learn about common vulnerabilities, severity breakdown, and more.

Read More
Secure Coding: A Practical Guide - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjZDE0NjZmOGJjODIuanBnJnZlcnNpb249MDAwMCZzaWc9ZTZkMjA1NDBkNmE5NDAyZGY4ZGQ5MjdiZmU2YWZiM2I

Top Tools and Tips to Improve Your DevOps Pipeline

Discover top tools and tips to enhance your DevOps pipeline. Learn about CI/CD, security, and automation for successful software development.

Read More
Secure Coding: A Practical Guide - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlYWFhZmVjMjZiOTYucG5nJnZlcnNpb249MDAwMCZzaWc9ZmFkZWMzYWI3YWViNGU5NDg5MTE3NWMyZDk5ZWU2ZTE

Observability: What You Need to Know

Learn about observability in DevOps and IT. Understand the importance of observability in today's complex software systems.

Read More
Secure Coding: A Practical Guide -

Open Source Analysis Extends Your Visibility

Discover how open source analysis can extend your visibility into your codebase, manage components, and mitigate security risks.

Read More
Secure Coding: A Practical Guide - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlOGM5YzIyNTY0OTYucG5nJnZlcnNpb249MDAwMCZzaWc9NDcwYzlmM2NiZTI4NzJhMmE0ZWYwNmY1YmRlODQzYmU

April Open Source Security Vulnerabilities Snapshot

Stay up to date with April's OSS Vulnerabilities Snapshot. Learn about the rise in vulnerabilities, severity breakdown, top CWEs, and more.

Read More
Secure Coding: A Practical Guide - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjYTM0NmRjOWY5MTYuanBnJnZlcnNpb249MDAwMCZzaWc9NDYzM2JkYzNmZDZiNjg0NTYzNDBmM2I5ZWEzYTMzY2E

Kubernetes Pod Security Policy Best Practices

Learn about Kubernetes pod security policies and best practices for securing your Kubernetes environment.

Read More
Secure Coding: A Practical Guide - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlODRmZTBhZGVlMGMuanBnJnZlcnNpb249MDAwMCZzaWc9ZmZhNjY3ZjgzOGU5ZTg2ODVjNzVjY2I0MDhkNWJkOGI

Top Zoom Backgrounds We Love For April 1st

Our humble tribute to April Fools’ Day is this collection of our favorite Zoom backgrounds from our very own Mend crew.

Read More
Secure Coding: A Practical Guide - whitesource software development

5 Ways to Speed Up Your Software Development Process

Learn how to speed up your software development process with 5 key tips. From continuous integration to limiting work in progress.

Read More
Secure Coding: A Practical Guide - 5 tips small

5 Tips for Using Open Source Components More Wisely

Learn how to use open source components wisely with 5 tips from Mend.io. From forking to managing changes.

Read More
Secure Coding: A Practical Guide -

Web Application Security at Every Stage of the SDLC

Discover the importance of web application security at every stage of the SDLC. Learn about key principles, tools, and best practices.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!