Top 5 New Open Source Vulnerabilities in March 2018
This month’s roundup of the top 5 new open source security vulnerabilities, was aggregated by the Mend database, which is updated continuously from the NVD
Read about application security, DevSecOps, license compliance, and software supply chain security.
This month’s roundup of the top 5 new open source security vulnerabilities, was aggregated by the Mend database, which is updated continuously from the NVD
Love it or hate, the annual RSA Conference (RSAC) in San Francisco is the largest cyber security conference in the world. It is where the world comes to talk and learn security. Inevitably every year at RSAC there are some technologies that become the industry buzzwords and hot buttons. These generally stay on top of...
Cheer on your favorite repositories as they go for the win Few things in the world of programming are as universal as GitHub. Boasting over 4 million users, the code-sharing site prides itself on...
The world of how work gets done has changed dramatically, moving at a faster pace with a far greater emphasis on collaboration for improving productivity. Today, virtually all software has a cloud...
Open Source has become the key building block for application development in today’s market, where companies are under constant pressure to accelerate time to market. The increasing adoption of open source components, however, has introduced new security challenges that most teams are not prepared to mitigate in their current posture. In this webinar, we will...
The famous, American poet Emily Dickinson is credited back in the 19th century as stating that “forever is composed of nows.” Today, the world of software is all about rapid releases, innovative...
Top 5 New Open Source Vulnerabilities in February 2018 Some things never change. For starters, February started with Punxsutawney Phil, the hero of Groundhog Day, once again coming out of...
Which company’s GitHub users are the most active contributors when it comes to the top open source languages?
Get the skinny on how to keep your apps safe in the year ahead, utilizing the best strategies and tools available If you want to assess how an organization understands its security, then you have...
In the latest round of regulations for companies doing business in the European Union, MiFID II will require some important overhauls for how data is stored The European Union’s recent set of...
A list of 15 AppSec and InfoSec experts, all of whom are opinion and thought leaders with a passion for making the internet a safer place.
Learn everything you need to know about NIST 800-171. Created to protect sensitive information from breaches by setting new standards for data protection.
“Free” and “open source” are two terms commonly used interchangeably in the software industry. Yet, for many, the difference between the two is not always clear.
Thanksgiving is upon us! Filled with food, family, and hopefully some football — let’s go Seahawks — Thanksgiving is the time when families gather and talk about what they are thankful for. Here...
How is DevOps handling the growing use of open source? What is the role of DevOps in defining an open source strategy and policy? Read on to learn about companys' secret weapons against OS threats.
Making the move to public clouds can seem like a Sisyphean task for many financial and healthcare organizations. Beyond covering the usual bases that are involved in the process, they face a set...
Facebook has announced that they will replace their now-notorious open source software license with a standard MIT license for some of their popular open source projects.
Educate yourself about the main security concerns that Big Data raises, and how to address them.
Equifax - one of the three main credit rating bureaus in the US, announced in a statement that it had experienced a major data breach.
while most industries have moved away from depending exclusively on proprietary software, the healthcare industry is still tied down to these legacy systems.
While a serverless architecture frees development teams from one set of problems, it does bring another set of problems to the forefront.
As we continue to review the buzzwords that were echoing out of all the tech and dev trend forecasts for 2017, this week we will begin to take a closer look at Serverless Computing. Towards the...
Looking for a personal assistant? A reliable medical second opinion about that annoying pain in your wrist? Help choosing the perfect RomCom for movie night? The fastest way to get to the airport...
Opening up your code to hackers, asking them to give it their best shot and offering rewards as high as $200k if they get back to you with a particularly scary breach might have sounded like a very bizarre course of action a few years ago. In today’s hectic and under-staffed cyber-security market it seems...
What is A Single Page Application Jeff Nibler describes Single Page Applications (SPAs) as the latest evolution in web application design. With SPAs, various JavaScript libraries and tools such as...
A continuous solution for open source management that is pre-integrate into your DevOps cycle is a critical enabler that DevOps teams should insist on implementing.
We already know that most if not all enterprises and organizations rely on open source software to develop their offerings. As organizations continuously extend their open source usage, we decided...
Which CI tool is best for your organization? This article compares Continuous Integration Tools from multiple perspectives.
Organizations and individuals have been using the wisdom of the crowds to elicit ideas, promote their vision or push their products forward since the 18th century. Jeff Howe coined the term...
"Easter vacation is just around the corner, and everyone around me is dreaming about vacation. Are you? Let’s play a little game: How will you plan your trip? How will you arrange your travels?..."
Apache Struts vulnerability CVE-2017-5638 has been exploited in the wild since before it was formally released, and after it was released with a fix. So...what are the key takeaways?
New Year’s Eve. The tangible electricity in the air. The unbridled optimism of a full year of new possibilities. The chance to get a little wild, and make a few mistakes. Who cares? It will all be...
In this webinar we learn how to address any open source security concerns within your organization, understand the difference between securing your open source components and your proprietary code,
"With the recent WordPress-Wix fiasco and Oracle and Google never ending battle on Java’s APIs, copyleft open source software licenses remains a hot topic. To understand which way the wind is..."
"Ever wanted to know the stories behind the logos of some of our favorite open source tools and technologies out there? Well, we here at Mend are all about open source! In this week's..."