Latest Content

Welcome to our resource center! We hope you find something interesting to read, watch and share.

  • Open Source License Comparison: Connecting — and Contrasting — the Dots

    Open Source License Comparison: Connecting — and Contrasting — the Dots

    Read Article
  • Serverless Security Explained

    Serverless Security Explained

    Read Article
  • Top 5 New Open Source Security Vulnerabilities in July 2019

    Top 5 New Open Source Security Vulnerabilities in July 2019

    Read Article
  • Application Security Best Practices Top 10 Checklist

    Application Security Best Practices Top 10 Checklist

    Read Article
  • ×

    Stay up to date, Subscribe to our newsletter today!

    Country
    I agree to receive email updates from WhiteSource
    Thank you!
    Error - something went wrong!
  • 5 Vulnerability Assessment Common Misperceptions

    5 Vulnerability Assessment Common Misperceptions

    Read Article
  • Software Composition Analysis: How to Choose the Right Solution

    Software Composition Analysis: How to Choose the Right Solution

    So your organization finally made the important decision of implementing an open source management solution. Now what? how do you choose from the array of technologies and tools around?

    Read Flipbook
  • Security Automation: Where Does It Fit In Your Secure SDLC?

    Security Automation: Where Does It Fit In Your Secure SDLC?

    Read Article
  • WhiteSource achieved Amazon Web Services DevOps Competency Status

    WhiteSource achieved Amazon Web Services DevOps Competency Status

    Read Article
  • Top 5  Open Source Security Vulnerabilities in June 2019

    Top 5 Open Source Security Vulnerabilities in June 2019

    Read Article
  • Top 5 Go Vulnerabilities That You Should Know

    Top 5 Go Vulnerabilities That You Should Know

    Go is fast becoming a favorite programming language in the community, a trend that is only likely to rise as Google uses it for more of their products. Stay ahead of hackers and check out these

    Read Article
  • 8 Patch Management Best Practices to Implement in 2019 to Close the Door on Attackers

    8 Patch Management Best Practices to Implement in 2019 to Close the Door on Attackers

    Read Article
  • Secure Coding: A Practical Guide

    Secure Coding: A Practical Guide

    Read Article
  • Top 5 New Open Source Security Vulnerabilities in May 2019

    Top 5 New Open Source Security Vulnerabilities in May 2019

    Read Article
  • Docker Container Monitoring: Protect Your Investment

    Docker Container Monitoring: Protect Your Investment

    Read Article
  • ×

    Stay up to date, Subscribe to our newsletter today!

    Country
    I agree to receive email updates from WhiteSource
    Thank you!
    Error - something went wrong!
  • SAST vs. SCA: It’s Like Comparing Apples to Oranges

    SAST vs. SCA: It’s Like Comparing Apples to Oranges

    Read Article
  • Top 5 Open Source Vulnerabilities for April 2019

    Top 5 Open Source Vulnerabilities for April 2019

    Read Article
  • Top 9 Tools and Tips for Improving Your DevOps Pipeline

    Top 9 Tools and Tips for Improving Your DevOps Pipeline

    Read Article
  • Docker Container Security: Challenges and Best Practices

    Docker Container Security: Challenges and Best Practices

    Read Article
  • HyperLedger - WhiteSource’s Open Source Project of the Month for April 2019

    HyperLedger - WhiteSource’s Open Source Project of the Month for April 2019

    Read Article
  • The Results for 2019 are in: Here are the Key Takeaways from Stack Overflow’s Developer Survey

    The Results for 2019 are in: Here are the Key Takeaways from Stack Overflow’s Developer Survey

    Read Article
  • loading
    Loading More...