Setting Up an Effective Vulnerability Management Policy
What you need to know in order to set up an effective and comprehensive vulnerability management process in your organization.
Read Article
The Rise of Software Supply Chain Attacks
Software supply chain attacks are increasing. Learn what a software supply chain attack is, and about the recent attacks.
Read Article
Three Open Source Software Security Myths Dispelled
How many times have you heard that "open source is not secure." We are here to dispel this and other open source software security concerns.
Read Article
Gray Box Testing Guide
Learn about the gray box testing, how it’s done, its techniques and tools, its advantages and disadvantages, and more.
Read Article
Open Source Licenses in 2021: Trends and Predictions
Permissive open source licences continue to trend. Which open source licenses were most popular in 2020, and what can we expect in 2021?
Read Article
API Security in a Digitally Transformed World
API security is an essential part of application security in a digitally transformed world.
Read Article
How to Set Up an Open Source Strategy
How to set up and implement an open source strategy that will ensure open source security and compliance.
Read Article
The 10 Best Security Conferences to Attend in 2021
Find the top security conferences to visit in 2021, virtually or in-person
Read Article
Top 10 Open Source Vulnerabilities In 2020
To help you stay on top of your open source security, here is our list of top 10 open source security vulnerabilities in 2020.
Read Article
What You Need To Know About Application Security Testing Orchestration
What is application security testing orchestration and why it is crucial in helping organizations make sure all potential risks are tracked and addressed.
Read Article
Kubernetes Security Best Practices
Kubernetes security should be a primary concern and not an afterthought. Learn how to avoid risks by applying security best practices.
Read Article
Microservices Architecture: Security Strategies and Best Practices
Why is microservices security important? Key principles and best practices to ensure your microservices architecture is secure.
Read Article
Software Composition Analysis Explained
In this article we explain what Software Composition Analysis tool is and why it should be part of your application security portfolio.
Read Article
White Box Testing Guide
Learn all about white box testing: how it’s done, its techniques, types, and tools, its advantages and disadvantages, and more.
Read Article
Achieving Application Security in Today’s Complex Digital World
All about application security - why is the application layer the weakest link, and how to get application security right.
Read Article
Top Tips for Getting Started With a Software Composition Analysis Solution
Top tips for getting started with WhiteSource Software Composition Analysis to ensure your implementation is successful.
Read Article
Top 10 Application Security Best Practices
Secure your organization's software by adopting these top 10 application security best practices and integrating them into your software development life cycle.
Read Article
Be Wise — Prioritize: Taking Application Security To the Next Level
How prioritization can help development and security teams minimize security debt and fix the most important security issues first.
Read Article
Eclipse SW360: Main Features
All about Eclipse SW360 - an application that helps manage the bill of materials — and its main features.
Read Article
Why Manually Tracking Open Source Components Is Futile
Why you shouldn't track open source components usage manually and what is the correct way to do it.
Read Article