Software Integrity Blog

Archive for the 'Software Composition Analysis (SCA)' Category

 

SAST and SCA: Why use both?

If you use an SCA tool, why should you use a SAST tool as well? Let’s discuss what each tool can and can’t do and how they complement each other.

Continue Reading...

Posted in Application Security, Software Composition Analysis (SCA), Static Analysis (SAST) | Comments Off on SAST and SCA: Why use both?

 

[Webinars] SAST and SCA together, managed pen testing for risk management

Learn how to combine SAST and SCA to find and fix more security and quality issues, and how managed pen testing supports your risk management strategy.

Continue Reading...

Posted in Software Composition Analysis (SCA), Software Security Program, Static Analysis (SAST), Webinars | Comments Off on [Webinars] SAST and SCA together, managed pen testing for risk management

 

How do you effectively remediate the increasing sea of vulnerabilities?

With applications containing more and more open source, and 40+ open source vulnerabilities disclosed daily, how do you prioritize your remediation efforts?

Continue Reading...

Posted in Application Security, Open Source Security, Software Composition Analysis (SCA) | Comments Off on How do you effectively remediate the increasing sea of vulnerabilities?

 

How to Cyber Security: Software is manufacturing

Modern software is a bit like manufacturing: gluing open source components together using proprietary code and tracking everything with a bill of materials.

Continue Reading...

Posted in Featured, Open Source Security, Software Composition Analysis (SCA) | Comments Off on How to Cyber Security: Software is manufacturing

 

[Webinar] Effective Vulnerability Remediation Requires More Than One Data Point

With advanced policy management and best-in-class vulnerability reports, developers can fix the most critical vulnerabilities quickly and effectively.

Continue Reading...

Posted in Open Source Security, Software Composition Analysis (SCA), Webinars | Comments Off on [Webinar] Effective Vulnerability Remediation Requires More Than One Data Point

 

Code quality and maintenance: Emerging risks of open source use

You know that static analysis can find code quality defects in your proprietary code. But what are you doing to manage your open source code quality risk?

Continue Reading...

Posted in Open Source Security, Software Composition Analysis (SCA) | Comments Off on Code quality and maintenance: Emerging risks of open source use

 

Find and fix open source and proprietary code security defects in the IDE with Polaris and Code Sight

With new SCA capabilities, the Code Sight IDE plugin detects vulnerabilities (CVEs) in the open source you use, alongside weaknesses in proprietary code.

Continue Reading...

Posted in News & Announcements, Open Source Security, Software Composition Analysis (SCA) | Comments Off on Find and fix open source and proprietary code security defects in the IDE with Polaris and Code Sight

 

[Webinars] Black Duck on VMware Cloud and open source scans

Learn about the addition of Black Duck to VMware Cloud Marketplace and the benefits and limitations of different types of open source scans.

Continue Reading...

Posted in Open Source Security, Software Composition Analysis (SCA), Webinars | Comments Off on [Webinars] Black Duck on VMware Cloud and open source scans

 

Which application security tools should you choose?

There’s no single silver bullet for application security. Instead, you need a combination of application security tools and services. Here’s an overview.

Continue Reading...

Posted in Application Security, Interactive Application Security Testing (IAST), Software Composition Analysis (SCA), Static Analysis (SAST) | Comments Off on Which application security tools should you choose?

 

Taking the next step in your application security program

Already using static code analysis? Try boosting your application security program with software composition analysis to automate open source management.

Continue Reading...

Posted in Application Security, Open Source Security, Software Composition Analysis (SCA) | Comments Off on Taking the next step in your application security program