Bigger Data, Bigger Problems: Three Major Challenges in Big Data Security
Educate yourself about the main security concerns that Big Data raises, and how to address them.
Read about application security, DevSecOps, license compliance, and software supply chain security.
Educate yourself about the main security concerns that Big Data raises, and how to address them.
Equifax - one of the three main credit rating bureaus in the US, announced in a statement that it had experienced a major data breach.
while most industries have moved away from depending exclusively on proprietary software, the healthcare industry is still tied down to these legacy systems.
While a serverless architecture frees development teams from one set of problems, it does bring another set of problems to the forefront.
As we continue to review the buzzwords that were echoing out of all the tech and dev trend forecasts for 2017, this week we will begin to take a closer look at Serverless Computing. Towards the...
Looking for a personal assistant? A reliable medical second opinion about that annoying pain in your wrist? Help choosing the perfect RomCom for movie night? The fastest way to get to the airport...
Opening up your code to hackers, asking them to give it their best shot and offering rewards as high as $200k if they get back to you with a particularly scary breach might have sounded like a very bizarre course of action a few years ago. In today’s hectic and under-staffed cyber-security market it seems...
What is A Single Page Application Jeff Nibler describes Single Page Applications (SPAs) as the latest evolution in web application design. With SPAs, various JavaScript libraries and tools such as...
A continuous solution for open source management that is pre-integrate into your DevOps cycle is a critical enabler that DevOps teams should insist on implementing.
We already know that most if not all enterprises and organizations rely on open source software to develop their offerings. As organizations continuously extend their open source usage, we decided...
Which CI tool is best for your organization? This article compares Continuous Integration Tools from multiple perspectives.
Organizations and individuals have been using the wisdom of the crowds to elicit ideas, promote their vision or push their products forward since the 18th century. Jeff Howe coined the term...
"Easter vacation is just around the corner, and everyone around me is dreaming about vacation. Are you? Let’s play a little game: How will you plan your trip? How will you arrange your travels?..."
Apache Struts vulnerability CVE-2017-5638 has been exploited in the wild since before it was formally released, and after it was released with a fix. So...what are the key takeaways?
New Year’s Eve. The tangible electricity in the air. The unbridled optimism of a full year of new possibilities. The chance to get a little wild, and make a few mistakes. Who cares? It will all be...
In this webinar we learn how to address any open source security concerns within your organization, understand the difference between securing your open source components and your proprietary code,
"With the recent WordPress-Wix fiasco and Oracle and Google never ending battle on Java’s APIs, copyleft open source software licenses remains a hot topic. To understand which way the wind is..."
"Ever wanted to know the stories behind the logos of some of our favorite open source tools and technologies out there? Well, we here at Mend are all about open source! In this week's..."
"It’s that time of year again, Thanksgiving! Just as we remember our forefathers who came to the New World in search of freedom, let’s spare a thought for those Open Source pioneers who helped..."
Do you remember in high school it seemed like all the cool kids seemed to be speaking in their own code? Well, it’s a bit like that in DevOps circles today. Everybody’s talking about Continuous Integration (CI) this, Continuous Deployment (CD) that. And who knows, you might even hear some people mentioning Continous Delivery (CDel)....
Rami Sass, Co-Founder at WhiteSource presented how you can use Jenkins latest integration with WhiteSource to fully monitor and control all open source licenses, including dependencies.
oin Corregan Brown, co- founder of ProjectLocker, and Rami Sass, co-founder of WhiteSource to learn about the benefits of cloud-based development and how to best manage the use of open source.
"Once again, a serious vulnerability has been found in the kernel of the OS which most server and smart phones on the planet run on - Linux. Not only that, the Dirty Cow vulnerability has been..."
"It’s happened again. Yesterday a new critical open source vulnerability was detected. This time, white hat hacker Dawid Golunski discovered a critical vulnerability affecting every available..."
Exploring the nefarious (and at times plain weird) story of ransomware, and how you can protect yourself from its grasps.
In this post we cover the top 4 challenges facing enterprises nowadays from improving their agility.
"If you manage a team of developers, you need to keep yourself up-to-date on the latest major developments in Open Source. Whether you need to keep an eye on your industry's latest open source..."
If you’re a development manager, your developers are using choosing many open source components during a project lifecycle. Are you in the know about how your team is checking open source...
Serious security threats keep hitting the Android platform. In response, both Google and device makers like Samsung and LG have recently made several proposals and initiatives to remedy this...
7 agile tools that you should consider, from initial planning, to project management, to day-to-day team communication and time tracking.
"The open source journey started back in the ‘50s with free software. It had many stops along the way until it became what we know today as open source. Open source finds its roots in the U.S...."
Let’s take a look at your most frequently asked questions about the GNU GPL with the Classpath exception.
If you run a Java-based application, you might be at risk. Discover what might turn out to be Java’s Heartbleed.
"To open source, or not open source, that is the question. The idea of opening a company’s source code attracts a lot of reactions: some companies are opening up to it, some don’t look at it as..."
Linus's Law says that if enough people are looking at a certain code, security & quality issues will be discovered. So how can we explain the massive security vulnerabilities?