Latest Content

Welcome to our resource center! We hope you find something interesting to read, watch and share.

  • Top 10 Application Security Best Practices

    Top 10 Application Security Best Practices

    Secure your organization's software by adopting these top 10 application security best practices and integrating them into your software development life cycle.

    Read Article
  • Why Manually Tracking Open Source Components Is Futile

    Why Manually Tracking Open Source Components Is Futile

    Why you shouldn't track open source components usage manually and what is the correct way to do it.

    Read Article
  • Find & Fix open source vulnerabilities in minutes

    Start Free Trial
  • Black Box Testing: What You Need to Know

    Black Box Testing: What You Need to Know

    What are the different types of black box testing, how is it different from while box testing, and how can black box testing help you boost security?

    Read Article
  • Top 7 Questions to Ask When Evaluating a Software Composition Analysis Solution

    Top 7 Questions to Ask When Evaluating a Software Composition Analysis Solution

    Software Composition Analysis software helps manage your open source components. Here are 7 questions you should ask before buying an SCA solution.

    Read Article
  • ×

    Stay up to date, subscribe to our newsletter today!

    Country
    I agree to receive email updates from WhiteSource
    Thank you!
    Error - something went wrong!
  • Top 9 Code Review Tools for Clean and Secure Source Code

    Top 9 Code Review Tools for Clean and Secure Source Code

    Read Article
  • Why Patch Management Is Important and How to Get It Right

    Why Patch Management Is Important and How to Get It Right

    How to make sure you have a solid patch management policy in place, check all of the boxes in the process, and use the right tools.

    Read Article
  • Static Application Security Testing: SAST Basics

    Static Application Security Testing: SAST Basics

    Read Article
  • Application Security Testing: Security Scanning Vs. Runtime Protection

    Application Security Testing: Security Scanning Vs. Runtime Protection

    Read Article
  • Our Favorite Web Vulnerability Scanners

    Our Favorite Web Vulnerability Scanners

    Read Article
  • License Compatibility: Combining Open Source Licenses

    License Compatibility: Combining Open Source Licenses

    While open source licenses are free, they still come with a set of terms & conditions that users must abide by. Read why license compatibility is a major concern.

    Read Article
  • Why You Need an Open Source Vulnerability Scanner

    Why You Need an Open Source Vulnerability Scanner

    An open source vulnerability scanner is a tool that helps organizations identify and fix any risks associated with open source software usage. Learn all about it.

    Read Article
  • Dynamic Application Security Testing: DAST Basics

    Dynamic Application Security Testing: DAST Basics

    Dynamic application security testing (DAST), or black-box testing, finds vulnerabilities by attacking an application from the outside while it's is running.

    Read Article
  • Everything You Wanted to Know About Open Source Attribution Reports

    Everything You Wanted to Know About Open Source Attribution Reports

    Read Article
  • Does IAST Fit Into Your AppSec Program?

    Does IAST Fit Into Your AppSec Program?

    Interactive application security testing (IAST) works from within an application to detect and report issues while an application is running.

    Read Article
  • ×

    Stay up to date, subscribe to our newsletter today!

    Country
    I agree to receive email updates from WhiteSource
    Thank you!
    Error - something went wrong!
  • July 2020 Open Source Security Vulnerabilities Snapshot

    July 2020 Open Source Security Vulnerabilities Snapshot

    Read Article
  • When’s the Right Time for an Open Source Audit?

    When’s the Right Time for an Open Source Audit?

    Open Source Audit. Three words which can make a big difference to the continued success of your organization? But when is the right time to start one, and why is it so important anyhow? Find...

    Read Article
  • Software Development Life Cycle: Finding a Model That Works

    Software Development Life Cycle: Finding a Model That Works

    The software development life cycle has are two main models: Waterfall and Agile. This blog identifies the phases of the SDLC and most common models.

    Read Article
  • Find & Fix open source vulnerabilities in minutes

    Start Free Trial
  • Vulnerability Prioritization Through The Eyes Of Hackers

    Vulnerability Prioritization Through The Eyes Of Hackers

    Read Document
  • CI/CD and the Promise of Agile Transformation

    CI/CD and the Promise of Agile Transformation

    Learn how CI/CD (continuous integration/continuous delivery) pushes frequent, incremental software updates & fixes regardless of size using automation tools.

    Read Article
  • June 2020 Open Source Security Vulnerabilities Snapshot

    June 2020 Open Source Security Vulnerabilities Snapshot

    Read Article
  • loading
    Loading More...