Software Integrity Blog

5 types of software licenses you need to understand

Different types of software licenses require you to meet certain obligations if you want to reuse the code. Here are 5 common types of software licenses.

Continue Reading...

[Webinar] Are You Acquiring the Next Big Breach?

Learn why application security vulnerabilities are a serious consideration in tech due diligence and how to evaluate your security risk in M&A transactions.

Continue Reading...

What is the Ghostcat vulnerability (CVE-2020-1938)?

Ghostcat (CVE-2020-1938) is an Apache Tomcat vulnerability that allows remote code execution in some circumstances. Here’s how to find and mitigate it.

Continue Reading...

3 ways to improve your software development skills

Learn how to broaden your knowledge, hone your software development skills, decide on a specialization—and stand out in an increasingly competitive field.

Continue Reading...

DevSecOps success takes people, not just technology

Want DevSecOps? Here are some tips to get your development, security, and operations teams communicating effectively and working toward a single purpose.

Continue Reading...

[Webinar] How Open Source Made Me a Better Manager

Learn about management practices inspired by open source principles, such as allowing the best ideas to guide the team, no matter who brings them up.

Continue Reading...

Tips for working from home without losing your marbles or compromising security

Our longtime remote employees have some tips for working from home to keep you sane, and your company’s assets secure, during a strange, stressful time.

Continue Reading...

Uncover SweynTooth vulnerabilities with Defensics fuzz testing

SweynTooth is a set of Bluetooth Low Energy vulnerabilities. We can reproduce many of these vulnerabilities using Defensics Bluetooth LE Test Suites.

Continue Reading...

How to deal with legacy vulnerabilities

Are you releasing software with legacy vulnerabilities that you put aside to address later but forgot about—or that you didn’t even know were in your code?

Continue Reading...

Open source software use grows in Germany, but compliance and risk management need improvement

A new report from Bitkom reveals that among companies that use open source, many aren’t sure of the best way to approach open source risk management.

Continue Reading...