DevSecOps

Learn about the latest DevSecOps tools, processes, and best practices

  • Setting Up an Effective Vulnerability Management Policy

    Setting Up an Effective Vulnerability Management Policy

    What you need to know in order to set up an effective and comprehensive vulnerability management process in your organization.

    Read Article
  • The Rise of Software Supply Chain Attacks

    The Rise of Software Supply Chain Attacks

    Software supply chain attacks are increasing. Learn what a software supply chain attack is, and about the recent attacks.

    Read Article
  • Find & Fix open source vulnerabilities in minutes

    Start Free Trial
  • The 10 Best Security Conferences to Attend in 2021

    The 10 Best Security Conferences to Attend in 2021

    Find the top security conferences to visit in 2021, virtually or in-person

    Read Article
  • Top 10 Open Source Vulnerabilities In 2020

    Top 10 Open Source Vulnerabilities In 2020

    To help you stay on top of your open source security, here is our list of top 10 open source security vulnerabilities in 2020.

    Read Article
  • ×

    Stay up to date, subscribe to our newsletter today!

    Country
    I agree to receive email updates from WhiteSource
    Thank you!
    Error - something went wrong!
  • What You Need To Know About Application Security Testing Orchestration

    What You Need To Know About Application Security Testing Orchestration

    What is application security testing orchestration and why it is crucial in helping organizations make sure all potential risks are tracked and addressed.

    Read Article
  • Microservices Architecture: Security Strategies and Best Practices

    Microservices Architecture: Security Strategies and Best Practices

    Why is microservices security important? Key principles and best practices to ensure your microservices architecture is secure.

    Read Article
  • Software Composition Analysis Explained

    Software Composition Analysis Explained

    In this article we explain what Software Composition Analysis tool is and why it should be part of your application security portfolio.

    Read Article
  • White Box Testing Guide

    White Box Testing Guide

    Learn all about white box testing: how it’s done, its techniques, types, and tools, its advantages and disadvantages, and more.

    Read Article
  • Achieving Application Security in Today’s Complex Digital World

    Achieving Application Security in Today’s Complex Digital World

    All about application security - why is the application layer the weakest link, and how to get application security right.

    Read Article
  • Top Tips for Getting Started With a Software Composition Analysis Solution

    Top Tips for Getting Started With a Software Composition Analysis Solution

    Top tips for getting started with WhiteSource Software Composition Analysis to ensure your implementation is successful.

    Read Article
  • Be Wise — Prioritize: Taking Application Security To the Next Level

    Be Wise — Prioritize: Taking Application Security To the Next Level

    How prioritization can help development and security teams minimize security debt and fix the most important security issues first.

    Read Article
  • Eclipse SW360: Main Features

    Eclipse SW360: Main Features

    All about Eclipse SW360 - an application that helps manage the bill of materials — and its main features.

    Read Article
  • Black Box Testing: What You Need to Know

    Black Box Testing: What You Need to Know

    What are the different types of black box testing, how is it different from while box testing, and how can black box testing help you boost security?

    Read Article
  • Top 9 Code Review Tools for Clean and Secure Source Code

    Top 9 Code Review Tools for Clean and Secure Source Code

    Read Article
  • Why Patch Management Is Important and How to Get It Right

    Why Patch Management Is Important and How to Get It Right

    How to make sure you have a solid patch management policy in place, check all of the boxes in the process, and use the right tools.

    Read Article
  • Application Security Testing: Security Scanning Vs. Runtime Protection

    Application Security Testing: Security Scanning Vs. Runtime Protection

    Read Article
  • How to Set Up an Open Source Strategy

    How to Set Up an Open Source Strategy

    How to set up and implement an open source strategy that will ensure open source security and compliance.

    Read Article
  • July 2020 Open Source Security Vulnerabilities Snapshot

    July 2020 Open Source Security Vulnerabilities Snapshot

    Read Article
  • Software Development Life Cycle: Finding a Model That Works

    Software Development Life Cycle: Finding a Model That Works

    The software development life cycle has are two main models: Waterfall and Agile. This blog identifies the phases of the SDLC and most common models.

    Read Article
  • CI/CD and the Promise of Agile Transformation

    CI/CD and the Promise of Agile Transformation

    Learn how CI/CD (continuous integration/continuous delivery) pushes frequent, incremental software updates & fixes regardless of size using automation tools.

    Read Article
  • loading
    Loading More...