Latest Content
Welcome to our resource center! We hope you find something interesting to read, watch and share.
-
Read ArticleTop 10 Open Source Vulnerabilities In 2020
To help you stay on top of your open source security, here is our list of top 10 open source security vulnerabilities in 2020.
-
Read ArticleWhat You Need To Know About Application Security Testing Orchestration
What is application security testing orchestration and why it is crucial in helping organizations make sure all potential risks are tracked and addressed.
-
Find & Fix open source vulnerabilities in minutes
Start Free Trial -
Read ArticleKubernetes Security Best Practices
Kubernetes security should be a primary concern and not an afterthought. Learn how to avoid risks by applying security best practices.
-
Read ArticleMicroservices Architecture: Security Strategies and Best Practices
Why is microservices security important? Key principles and best practices to ensure your microservices architecture is secure.
-
Read ArticleSoftware Composition Analysis Explained
In this article we explain what Software Composition Analysis tool is and why it should be part of your application security portfolio.
-
Read ArticleWhite Box Testing Guide
Learn all about white box testing: how it’s done, its techniques, types, and tools, its advantages and disadvantages, and more.
-
Read ArticleAchieving Application Security in Today’s Complex Digital World
All about application security - why is the application layer the weakest link, and how to get application security right.
-
Read ArticleTop Tips for Getting Started With a Software Composition Analysis Solution
Top tips for getting started with WhiteSource Software Composition Analysis to ensure your implementation is successful.
-
Read ArticleTop 10 Application Security Best Practices
Secure your organization's software by adopting these top 10 application security best practices and integrating them into your software development life cycle.
-
Read ArticleWhy Manually Tracking Open Source Components Is Futile
Why you shouldn't track open source components usage manually and what is the correct way to do it.
-
Read ArticleBlack Box Testing: What You Need to Know
What are the different types of black box testing, how is it different from while box testing, and how can black box testing help you boost security?
-
Read ArticleTop 7 Questions to Ask When Evaluating a Software Composition Analysis Solution
Software Composition Analysis software helps manage your open source components. Here are 7 questions you should ask before buying an SCA solution.
-
Read ArticleTop 9 Code Review Tools for Clean and Secure Source Code
-
Read ArticleWhy Patch Management Is Important and How to Get It Right
How to make sure you have a solid patch management policy in place, check all of the boxes in the process, and use the right tools.
-
Read ArticleStatic Application Security Testing: SAST Basics
Learn all about SAST - what it is, how it works, its strengths and weaknesses, how it can be improved and what to look for in SAST tools.
-
Read ArticleApplication Security Testing: Security Scanning Vs. Runtime Protection
-
Read ArticleOur Favorite Web Vulnerability Scanners
-
Find & Fix open source vulnerabilities in minutes
Start Free Trial -
Read ArticleLicense Compatibility: Combining Open Source Licenses
While open source licenses are free, they still come with a set of terms & conditions that users must abide by. Read why license compatibility is a major concern.
-
Read ArticleWhy You Need an Open Source Vulnerability Scanner
An open source vulnerability scanner is a tool that helps organizations identify and fix any risks associated with open source software usage. Learn all about it.
-
Read ArticleDynamic Application Security Testing: DAST Basics
Dynamic application security testing (DAST), or black-box testing, finds vulnerabilities by attacking an application from the outside while it's is running.
-
Loading More...


