Latest Content

Welcome to our resource center! We hope you find something interesting to read, watch and share.

  • The Top 10 Linux Kernel Vulnerabilities You Should Know

    The Top 10 Linux Kernel Vulnerabilities You Should Know

    Read Article
  • Is One Programming Language More Secure Than The Rest?

    Is One Programming Language More Secure Than The Rest?

    Read Article
  • Your Guide to Open Source Vs Proprietary Software Security

    Your Guide to Open Source Vs Proprietary Software Security

    Read Article
  • PCI Software Security Framework: All You Need to Know

    PCI Software Security Framework: All You Need to Know

    The PCI Software Security Framework lays out new guidelines for payment application developers. We break down what you need to be compliant.

    Read Article
  • ×

    Stay up to date, Subscribe to our newsletter today!

    Country
    I agree to receive email updates from WhiteSource
    Thank you!
    Error - something went wrong!
  • Inspiring The Next Generation Of Women In Tech At WhiteSource

    Inspiring The Next Generation Of Women In Tech At WhiteSource

    We took the opportunity of International Women's Day to hear from female developers at WhiteSource. They offer their stories of how they came to tech as well as advice for companies and women.

    Read Article
  • Top 5 New Open Source Vulnerabilities in February 2019

    Top 5 New Open Source Vulnerabilities in February 2019

    Read Article
  • Top 5 Docker Vulnerabilities You Should Know

    Top 5 Docker Vulnerabilities You Should Know

    Read Article
  • WhiteSource To Offer New Pipe Integration for Bitbucket

    WhiteSource To Offer New Pipe Integration for Bitbucket

    Read Article
  • Bulma- WhiteSource’s Open Source Project of the Month for February 2019

    Bulma- WhiteSource’s Open Source Project of the Month for February 2019

    Read Article
  • Experience over Best Practices- Interview with CyberArk’s WhiteHat Hacker Len Noe

    Experience over Best Practices- Interview with CyberArk’s WhiteHat Hacker Len Noe

    Read Article
  • DevSecOps: From Theory to Practice

    DevSecOps: From Theory to Practice

    Read Article
  • The Devops Challenge: Open Source Security at Scale48:54

    The Devops Challenge: Open Source Security at Scale

    Watch Video
  • 3 Crucial Tips for Smarter Container Security Scanning

    3 Crucial Tips for Smarter Container Security Scanning

    Read Article
  • Kubernetes Security Best Practices: From Hosting to Deployment

    Kubernetes Security Best Practices: From Hosting to Deployment

    Read Article
  • ×

    Stay up to date, Subscribe to our newsletter today!

    Country
    I agree to receive email updates from WhiteSource
    Thank you!
    Error - something went wrong!
  • Top 5 New Open Source Vulnerabilities in January 2019

    Top 5 New Open Source Vulnerabilities in January 2019

    Read Article
  • The Complete Guide to Open Source Licenses 2019

    The Complete Guide to Open Source Licenses 2019

    Read Flipbook
  • Software Vulnerability 101

    Software Vulnerability 101

    Read Article
  • Now Tech: Software  Composition Analysis,  Q1 2019

    Now Tech: Software Composition Analysis, Q1 2019

    Read Flipbook
  • Open Source Licenses Explained

    Open Source Licenses Explained

    Read Article
  • The DevOps Guide: Implementing Cultural Change

    The DevOps Guide: Implementing Cultural Change

    Read Flipbook
  • loading
    Loading More...