A Guide to Ransomware, Open Source and IoT
Exploring the nefarious (and at times plain weird) story of ransomware, and how you can protect yourself from its grasps.
Read about application security, DevSecOps, open source license compliance and audit
Exploring the nefarious (and at times plain weird) story of ransomware, and how you can protect yourself from its grasps.
With the disclosure last week that over 900 million android phones were susceptible to the QuadRooter vulnerability, you could be forgiven for thinking that that was enough excitement for now....
Security positions are difficult to fill, therefore, it’s essential to retain security superstars. what are the key ways you can prevent your top performers from jumping ship?
Serious security threats keep hitting the Android platform. In response, both Google and device makers like Samsung and LG have recently made several proposals and initiatives to remedy this...
If you run a Java-based application, you might be at risk. Discover what might turn out to be Java’s Heartbleed.
Linus's Law says that if enough people are looking at a certain code, security & quality issues will be discovered. So how can we explain the massive security vulnerabilities?
Learn how to continuously manage your open source components, enforce license compliance, and be notified when security vulnerabilities are discovered and fixed.
"Watch this webinar to better understand how to reduce open source security risks. In this webinar we explain, how crucial and effective open source usage management is in reducing the security risks"
Like 80% of other development teams, you are increasingly relying on open source components. This enables you to develop faster, reduce costs and improve efficiency. On the flip side, it is very difficult to know what components were used, and in which parts of your product. When a security vulnerability is discovered in an open...
Stagefright is a security vulnerability that makes it possible for a hacker to turn your smartphone to a trojaned phone by just sending an MMS containing a video with malware. All a hacker needs...
In this post we discuss the methods and tools that can help you address security issues in the best and most effective manner.