Latest Content

Welcome to our resource center! We hope you find something interesting to read, watch and share.

  • 5 Female Pioneers of Software Development We’re Grateful For This Thanksgiving

    5 Female Pioneers of Software Development We’re Grateful For This Thanksgiving

    Read Article
  • CVSS v3 Creates New Challenges For Developers

    CVSS v3 Creates New Challenges For Developers

    Read Article
  • Top 5 New Open Source Security Vulnerabilities in October 2018

    Top 5 New Open Source Security Vulnerabilities in October 2018

    October's list of Top 5 New Open Source Security Vulnerabilities includes major players like libssh, X.Org X Server, Git, and Requests HTTPS Library for Python

    Read Article
  • OWASP Top 10 Vulnerabilities List — You’re Probably Using It Wrong

    OWASP Top 10 Vulnerabilities List — You’re Probably Using It Wrong

    We break down the basics of what you need to know about the OWASP Top 10 Vulnerabilities List and how to use it the right way to support your development team.

    Read Article
  • ×

    Stay up to date, Subscribe to our newsletter today!

    Country
    I agree to receive email updates from WhiteSource
    Thank you!
    Error - something went wrong!
  • 5 Scary Security Mistakes That Are Haunting Your Developers

    5 Scary Security Mistakes That Are Haunting Your Developers

    Halloween special: teams of developers aren't haunted by your typical ghosts, witches, and vampires. So what are developers’ really afraid of?

    Read Article
  • Apache Struts Vulnerabilities vs Spring Vulnerabilities

    Apache Struts Vulnerabilities vs Spring Vulnerabilities

    Read Article
  • Learn From the Best: Vulnerability Management Best Practices from the Best in the Business

    Learn From the Best: Vulnerability Management Best Practices from the Best in the Business

    Read Article
  • Top 5 New Open Source Security Vulnerabilities in September 2018

    Top 5 New Open Source Security Vulnerabilities in September 2018

    Read Article
  • The State of Open Source Vulnerability Management

    The State of Open Source Vulnerability Management

    Read Flipbook
  • Creating Your Open Source Policy Template: 3 Points You Don't Want to Overlook

    Creating Your Open Source Policy Template: 3 Points You Don't Want to Overlook

    Read Article
  • SANS Product Review of WhiteSource

    SANS Product Review of WhiteSource

    Read Flipbook
  • Back to School: The Top Open Source Projects To Use When Starting Out As A Developer

    Back to School: The Top Open Source Projects To Use When Starting Out As A Developer

    Read Article
  • Eclipse Che- WhiteSource’s Open Source Project of the Month for September 2018

    Eclipse Che- WhiteSource’s Open Source Project of the Month for September 2018

    Read Article
  • Securing Open Source Report by 451 Research

    Securing Open Source Report by 451 Research

    Read Flipbook
  • ×

    Stay up to date, Subscribe to our newsletter today!

    Country
    I agree to receive email updates from WhiteSource
    Thank you!
    Error - something went wrong!
  • How to Make Your Vulnerability Management Metrics Count

    How to Make Your Vulnerability Management Metrics Count

    Which vulnerability management metrics do you need, to ensure that you've got vulnerability detection, remediation, patching and prioritization right?

    Read Article
  • Top 5 New Open Source Security Vulnerabilities in August 2018

    Top 5 New Open Source Security Vulnerabilities in August 2018

    Read Article
  • Why Your Application Security Journey Must Start with a Comprehensive Software Composition Analysis (SCA) Program

    Why Your Application Security Journey Must Start with a Comprehensive Software Composition Analysis (SCA) Program

    Read Article
  •  Equifax Breach Year in Review: Vulnerabilities in Apache Struts Still Going Strong

    Equifax Breach Year in Review: Vulnerabilities in Apache Struts Still Going Strong

    Read Article
  • The Future of Vulnerability Management Programs

    The Future of Vulnerability Management Programs

    The future of vulnerability management programs consists of advanced automated solutions for vulnerability scanning, prioritization and remediation

    Read Article
  • OWASP A9: Using Components With Known Vulnerabilities - Why You Can't Ignore It

    OWASP A9: Using Components With Known Vulnerabilities - Why You Can't Ignore It

    Read Article
  • loading
    Loading More...