Top 5 New Open Source Vulnerabilities in February 2018
Top 5 New Open Source Vulnerabilities in February 2018 Some things never change. For starters, February started with Punxsutawney Phil, the hero of Groundhog Day, once again coming out of...
Read about application security, DevSecOps, license compliance, and software supply chain security.
Top 5 New Open Source Vulnerabilities in February 2018 Some things never change. For starters, February started with Punxsutawney Phil, the hero of Groundhog Day, once again coming out of...
Which company’s GitHub users are the most active contributors when it comes to the top open source languages?
Get the skinny on how to keep your apps safe in the year ahead, utilizing the best strategies and tools available If you want to assess how an organization understands its security, then you have...
In the latest round of regulations for companies doing business in the European Union, MiFID II will require some important overhauls for how data is stored The European Union’s recent set of...
A list of 15 AppSec and InfoSec experts, all of whom are opinion and thought leaders with a passion for making the internet a safer place.
Learn everything you need to know about NIST 800-171. Created to protect sensitive information from breaches by setting new standards for data protection.
“Free” and “open source” are two terms commonly used interchangeably in the software industry. Yet, for many, the difference between the two is not always clear.
Thanksgiving is upon us! Filled with food, family, and hopefully some football — let’s go Seahawks — Thanksgiving is the time when families gather and talk about what they are thankful for. Here...
How is DevOps handling the growing use of open source? What is the role of DevOps in defining an open source strategy and policy? Read on to learn about companys' secret weapons against OS threats.
Making the move to public clouds can seem like a Sisyphean task for many financial and healthcare organizations. Beyond covering the usual bases that are involved in the process, they face a set...
Facebook has announced that they will replace their now-notorious open source software license with a standard MIT license for some of their popular open source projects.
Educate yourself about the main security concerns that Big Data raises, and how to address them.
Equifax - one of the three main credit rating bureaus in the US, announced in a statement that it had experienced a major data breach.
while most industries have moved away from depending exclusively on proprietary software, the healthcare industry is still tied down to these legacy systems.
While a serverless architecture frees development teams from one set of problems, it does bring another set of problems to the forefront.
As we continue to review the buzzwords that were echoing out of all the tech and dev trend forecasts for 2017, this week we will begin to take a closer look at Serverless Computing. Towards the...
Looking for a personal assistant? A reliable medical second opinion about that annoying pain in your wrist? Help choosing the perfect RomCom for movie night? The fastest way to get to the airport...
Opening up your code to hackers, asking them to give it their best shot and offering rewards as high as $200k if they get back to you with a particularly scary breach might have sounded like a very bizarre course of action a few years ago. In today’s hectic and under-staffed cyber-security market it seems...
What is A Single Page Application Jeff Nibler describes Single Page Applications (SPAs) as the latest evolution in web application design. With SPAs, various JavaScript libraries and tools such as...
A continuous solution for open source management that is pre-integrate into your DevOps cycle is a critical enabler that DevOps teams should insist on implementing.
We already know that most if not all enterprises and organizations rely on open source software to develop their offerings. As organizations continuously extend their open source usage, we decided...
Which CI tool is best for your organization? This article compares Continuous Integration Tools from multiple perspectives.
Organizations and individuals have been using the wisdom of the crowds to elicit ideas, promote their vision or push their products forward since the 18th century. Jeff Howe coined the term...
"Easter vacation is just around the corner, and everyone around me is dreaming about vacation. Are you? Let’s play a little game: How will you plan your trip? How will you arrange your travels?..."
Apache Struts vulnerability CVE-2017-5638 has been exploited in the wild since before it was formally released, and after it was released with a fix. So...what are the key takeaways?
New Year’s Eve. The tangible electricity in the air. The unbridled optimism of a full year of new possibilities. The chance to get a little wild, and make a few mistakes. Who cares? It will all be...
In this webinar we learn how to address any open source security concerns within your organization, understand the difference between securing your open source components and your proprietary code,
"With the recent WordPress-Wix fiasco and Oracle and Google never ending battle on Java’s APIs, copyleft open source software licenses remains a hot topic. To understand which way the wind is..."
"Ever wanted to know the stories behind the logos of some of our favorite open source tools and technologies out there? Well, we here at Mend are all about open source! In this week's..."
"It’s that time of year again, Thanksgiving! Just as we remember our forefathers who came to the New World in search of freedom, let’s spare a thought for those Open Source pioneers who helped..."
Do you remember in high school it seemed like all the cool kids seemed to be speaking in their own code? Well, it’s a bit like that in DevOps circles today. Everybody’s talking about Continuous Integration (CI) this, Continuous Deployment (CD) that. And who knows, you might even hear some people mentioning Continous Delivery (CDel)....
Rami Sass, Co-Founder at WhiteSource presented how you can use Jenkins latest integration with WhiteSource to fully monitor and control all open source licenses, including dependencies.
oin Corregan Brown, co- founder of ProjectLocker, and Rami Sass, co-founder of WhiteSource to learn about the benefits of cloud-based development and how to best manage the use of open source.
"Once again, a serious vulnerability has been found in the kernel of the OS which most server and smart phones on the planet run on - Linux. Not only that, the Dirty Cow vulnerability has been..."
"It’s happened again. Yesterday a new critical open source vulnerability was detected. This time, white hat hacker Dawid Golunski discovered a critical vulnerability affecting every available..."