Software Integrity Blog

Archive for the 'Software Composition Analysis' Category

 

You’re using open source software, and you need to keep track of it

How should you track open source? It’s almost definitely in your codebase, so the question is not whether to track it but what could happen if you don’t.

Continue Reading...

Posted in Open Source Security, Software Composition Analysis | Comments Off on You’re using open source software, and you need to keep track of it

 

Technology company M&A: Do due diligence on SDLC process/tools

Technical due diligence on the target’s SDLC is a must for acquirers in software M&A. What you don’t know about their process and tools could hurt you.

Continue Reading...

Posted in Featured, Mergers & Acquisitions, Open Source Security, Software Composition Analysis | Comments Off on Technology company M&A: Do due diligence on SDLC process/tools

 

Forrester recognizes Synopsys as a leader in software composition analysis

Black Duck is among platforms that lead the pack, cited for “very strong policy management and SDLC integrations and strong proactive vulnerability management.”

Continue Reading...

Posted in Open Source Security, Software Composition Analysis | Comments Off on Forrester recognizes Synopsys as a leader in software composition analysis

 

The hidden costs and risks of free puppies (and open source)

SCA tools are an essential part of your AppSec toolkit, because free and open source software—just like free puppies—comes with hidden costs and risks.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Maturity Model (BSIMM), Open Source Security, Software Composition Analysis | Comments Off on The hidden costs and risks of free puppies (and open source)

 

Hacking Security Episode 3: OSSRA report findings

Hacking Security is a monthly podcast on emerging trends in application security. Episode 3 explores key findings from the 2018 OSSRA report.

Continue Reading...

Posted in Mergers & Acquisitions, Open Source Security, Software Composition Analysis | Comments Off on Hacking Security Episode 3: OSSRA report findings

 

Eating our own duck food: Software composition analysis in the Synopsys SDLC

In the Synopsys Software Integrity Group, we test all our products against one another—turning our security into a force multiplier for our customers’ security.

Continue Reading...

Posted in Software Composition Analysis | Comments Off on Eating our own duck food: Software composition analysis in the Synopsys SDLC

 

NPM dependencies, supply chain attacks, and Bitcoin wallets

The EventStream incident shows just how easily attackers can infiltrate the open source software supply chain by adding a malicious dependency to a trusted component.

Continue Reading...

Posted in Open Source Security, Software Composition Analysis | Comments Off on NPM dependencies, supply chain attacks, and Bitcoin wallets

 

Open source security risk: Managing the threat in mergers and acquisitions

The prevalence of open source is a potential M&A risk, as buyers are often not aware that more than 50% of the code they acquire is made up of open source.

Continue Reading...

Posted in Mergers & Acquisitions, Open Source Security, Software Composition Analysis | Comments Off on Open source security risk: Managing the threat in mergers and acquisitions

 

Securing containers at scale

Open source is the foundation of most modern applications. However, left untracked, open source can put containerized applications at risk of known vulnerabilities such as Heartbleed and CVE-2017-5638 found in Apache Struts.

Continue Reading...

Posted in Container Security, Open Source Security, Software Composition Analysis | Comments Off on Securing containers at scale

 

The intersection between IAST and SCA and why you need both in your security toolkit

Interactive application security testing (IAST) and software composition analysis (SCA) are powerful technologies—and you need both in your security toolkit.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Interactive Application Security Testing (IAST), Software Composition Analysis | Comments Off on The intersection between IAST and SCA and why you need both in your security toolkit