Software Integrity Blog

Archive for the 'Open Source Security' Category

 

Introducing Black Duck for Google Cloud Build

To support the launch of Binary Authorization, we’re releasing Black Duck for Google Cloud Build to help ensure your images are free of policy violations.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Container Security, News & Announcements, Open Source Security, Software Composition Analysis (SCA) | Comments Off on Introducing Black Duck for Google Cloud Build

 

Introducing the Black Duck Jira Cloud integration

The Black Duck Jira Cloud integration is based on a flexible, customizable model, backed by the same exemplary Black Duck software composition product.

Continue Reading...

Posted in News & Announcements, Open Source Security, Software Composition Analysis (SCA) | Comments Off on Introducing the Black Duck Jira Cloud integration

 

Review of Apache Struts vulnerabilities yields 24 updated advisories

We found that 24 Apache Struts Security Advisories incorrectly list impacted versions and that previously disclosed vulns affect an additional 61 versions.

Continue Reading...

Posted in News & Announcements, Open Source Security | Comments Off on Review of Apache Struts vulnerabilities yields 24 updated advisories

 

The license and security risks of using Node.js

The use of Node.js is rising. But many organizations don’t know about the potential license and security risks that Node.js can pose for their applications.

Continue Reading...

Posted in Open Source Security, Web Application Security | Comments Off on The license and security risks of using Node.js

 

[Webinars] Cloud security and open source licensing

Learn how to adopt a cloud-native model for application security and how to mitigate legal risk by better understanding open source licensing obligations.

Continue Reading...

Posted in Cloud Security, Open Source Security, Webinars | Comments Off on [Webinars] Cloud security and open source licensing

 

3 use cases where source code scanning doesn’t cut it

Binary code analysis tools are essential when you don’t have access to a build environment or source code. Here are some use cases for scanning binary code.

Continue Reading...

Posted in Open Source Security | Comments Off on 3 use cases where source code scanning doesn’t cut it

 

Open source audits: The secret ingredient for successful M&A

Identifying open source in the target’s codebase is essential to M&A transactions involving software. Open source audits go far beyond what SCA can provide.

Continue Reading...

Posted in Mergers & Acquisitions, Open Source Security | Comments Off on Open source audits: The secret ingredient for successful M&A

 

[Webinars] Software supply chain and open source scans

Learn how different open source scans create different value for M&A transactions, and how binary analysis can help you secure your software supply chain.

Continue Reading...

Posted in Mergers & Acquisitions, Open Source Security, Webinars | Comments Off on [Webinars] Software supply chain and open source scans

 

Top 3 operational open source risk factors

Consider these three operational open source risk factors when using open source components: version currency, version proliferation, and project activity.

Continue Reading...

Posted in Mergers & Acquisitions, Open Source Security | Comments Off on Top 3 operational open source risk factors

 

You’re using open source software, and you need to keep track of it

How should you track open source? It’s almost definitely in your codebase, so the question is not whether to track it but what could happen if you don’t.

Continue Reading...

Posted in Open Source Security, Software Composition Analysis (SCA) | Comments Off on You’re using open source software, and you need to keep track of it