Software Integrity Blog

Archive for the 'Open Source Security' Category

 

What is a software bill of materials?

With a software bill of materials (software BOM), you can respond quickly to the security, license, and operational risks that come with open source use.

Continue Reading...

Posted in Open Source Security, Software Composition Analysis (SCA) | Comments Off on What is a software bill of materials?

 

JDA Software: Extending their SDLC to remediate open source issues

Smart organizations in the business of building software need to use a mix of application testing tools to ensure their code is high-quality and secure.

Continue Reading...

Posted in Open Source Security, Software Composition Analysis (SCA) | Comments Off on JDA Software: Extending their SDLC to remediate open source issues

 

Open source for lawyers: Costs of open source use

Open source might be free, but it’s not risk-free. Let’s examine the potential legal cost of open source use associated with license noncompliance.

Continue Reading...

Posted in Mergers & Acquisitions, Open Source Security, Software Compliance, Quality & Standards | Comments Off on Open source for lawyers: Costs of open source use

 

[Webinars] CI/CD optimization and automated testing, open source audit reports

Learn how our CloudBees partnership helps users optimize CI/CD and automate AppSec Testing, and steps to take after you get an open source audit report.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Mergers & Acquisitions, Open Source Security, Webinars | Comments Off on [Webinars] CI/CD optimization and automated testing, open source audit reports

 

[Webinars] How to risk rank vulnerabilities, insights from BSIMM10

Learn about five ways to approach risk ranking in vulnerability management, and hear key insights into real-life software security programs from BSIMM10.

Continue Reading...

Posted in Open Source Security, Software Security Program, Webinars | Comments Off on [Webinars] How to risk rank vulnerabilities, insights from BSIMM10

 

Top open source licenses and legal risk for developers

Learn about the top open source licenses used by developers, including the 20 most popular open source licenses, and their legal risk categories.

Continue Reading...

Posted in Featured, Open Source Security, Software Composition Analysis (SCA) | Comments Off on Top open source licenses and legal risk for developers

 

Cyber security audits top due diligence checklists

In a study by (ISC)2, all executives and M&A professionals surveyed agreed that cyber security audits have become standard practice in tech due diligence.

Continue Reading...

Posted in Mergers & Acquisitions, Open Source Security | Comments Off on Cyber security audits top due diligence checklists

 

Top 3 reasons to choose Black Duck

What sets Black Duck apart from other SCA solutions? Industry-leading innovation, extensive vulnerability detection, and a broad range of integrations.

Continue Reading...

Posted in Open Source Security, Software Composition Analysis (SCA) | Comments Off on Top 3 reasons to choose Black Duck

 

[Webinars] NVD data feed alternatives and software security metrics

Learn about a better, faster alternative to NVD vulnerability data feeds and how to measure software security effectiveness and use metrics to drive change.

Continue Reading...

Posted in Open Source Security, Software Security Program, Webinars | Comments Off on [Webinars] NVD data feed alternatives and software security metrics

 

[Webinar] Black Duck Legal Certification Course

Learn about software due diligence and how to answer your clients’ open source questions in our Black Duck Legal Certification Course.

Continue Reading...

Posted in Mergers & Acquisitions, Open Source Security, Webinars | Comments Off on [Webinar] Black Duck Legal Certification Course