Many companies are relaxed about reusing software under the Beerware License and similar open source licenses. But not all such licenses are created equal.
How many BSIMM participants have a software security group? How many think it’s key to their success? How many people are in the average SSG? Get the facts.
The list of regulatory compliance challenges facing companies grows longer every time a new regulation is introduced. But do security regulations even work?
Modern applications contain over 50% open source components. Do you have an open source vulnerability management solution for your container environment?
If you want to enjoy your Sunday kickoffs, our software security program checklist of five activities will help you kick off your program successfully.
Chain Heist, our blockchain capture-the-flag at DEF CON 2019, showed that vulnerability detection tooling for blockchain security still has a way to go.
Safety-critical software powers everything from airplanes to power plants, defib machines, and seatbelts. And quality issues can lead to injury and death.
Learn how interactive application security testing (IAST) fits into any CI/CD pipeline and how to secure your Azure CI/CD Pipelines with Synopsys Detect.
Experts have given kudos to Apple for expanding its bug bounty program to all researchers. But is the $1 million top prize enough to turn black hats white?
The Black Duck Jira Cloud integration is based on a flexible, customizable model, backed by the same exemplary Black Duck software composition product.