Software Integrity Blog

Archive for the 'Software Composition Analysis (SCA)' Category

 

An introduction to installing Black Duck

Get started with the Dockerized Black Duck installation. This post outlines workplace specifications, tools, and steps for installing Black Duck.

Continue Reading...

Posted in Software Composition Analysis (SCA)

 

The advanced license compliance functionality you didn’t know your SCA tool needed

Open source license noncompliance can have severe implications. Here are four advanced license compliance features that help protect your proprietary code.

Continue Reading...

Posted in Software Composition Analysis (SCA)

 

Why developers need a supplemental source to NVD vulnerability data

The NVD is a good source for open source vulnerability data. But with an average 27-day reporting delay, it shouldn’t be your only source of information.

Continue Reading...

Posted in Open Source Security, Software Composition Analysis (SCA)

 

[Webinars] Vulnerability reports, application security for DevOps and CI/CD

Learn how vulnerability reports can help you fix critical vulnerabilities effectively, and the essentials of application security for DevOps and CI/CD.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Open Source Security, Software Composition Analysis (SCA), Software Security Program, Webinars

 

SAST and SCA: Why use both?

If you use an SCA tool, why should you use a SAST tool as well? Let’s discuss what each tool can and can’t do and how they complement each other.

Continue Reading...

Posted in Application Security, Software Composition Analysis (SCA), Static Analysis (SAST)

 

[Webinars] SAST and SCA together, managed pen testing for risk management

Learn how to combine SAST and SCA to find and fix more security and quality issues, and how managed pen testing supports your risk management strategy.

Continue Reading...

Posted in Software Composition Analysis (SCA), Software Security Program, Static Analysis (SAST), Webinars

 

How do you effectively remediate the increasing sea of vulnerabilities?

With applications containing more and more open source, and 40+ vulnerabilities disclosed daily, how do you prioritize your remediation efforts?

Continue Reading...

Posted in Application Security, Open Source Security, Software Composition Analysis (SCA)

 

How to Cyber Security: Software is manufacturing

Modern software is a bit like manufacturing: gluing open source components together using proprietary code and tracking everything with a bill of materials.

Continue Reading...

Posted in Open Source Security, Software Composition Analysis (SCA)

 

[Webinar] Effective Vulnerability Remediation Requires More Than One Data Point

With advanced policy management and best-in-class vulnerability reports, developers can fix the most critical vulnerabilities quickly and effectively.

Continue Reading...

Posted in Open Source Security, Software Composition Analysis (SCA), Webinars

 

Code quality and maintenance: Emerging risks of open source use

You know that static analysis can find code quality defects in your proprietary code. But what are you doing to manage your open source code quality risk?

Continue Reading...

Posted in Open Source Security, Software Composition Analysis (SCA)