Other content in this Stream
The Equifax Hack: 6 Months Later, What Did We Learn?
Top 5 New Open Source Vulnerabilities in March 2018
Top 5 New Open Source Vulnerabilities for February 2018
Top 5 New Open Source Vulnerabilities in February 2018 Some things never change. For starters, February started with Punxsutawney Phil, the hero of Groundhog Day, once again coming out of...
Case Study - Global Bank Automates Open Source Security and License Compliance Management
7 Facts Every CISO Needs To Know About Open Source Security
With great power comes great responsibility, and securing your organization’s open source components comes with a different set of considerations that every CISO should know.
Top 5 New Open Source Vulnerabilities of January 2018
Top 5 New Open Source Vulnerabilities for January 2018 According to our database, January brought in some new and nasty open source vulnerabilities. Which ones hit us the hardest? It seems like...
The State Of Application Security 2018 and Beyond
Before slowing down development and causing customers to revolt, security and risk pros should read this report to understand the current state of application security and how emerging techniques supp
GDPR: Friend or Foe
In this white paper, we explore some of the key GDPR regulations, the consequences of non-compliance, and how organizations can use the GDPR to re-examine and upgrade their security posture.
How to Survive Your First 100 Days as Head of DevOps
Leading and Adopting DevOps in Your Organization You’ve just been given the responsibility to lead a DevOps transformation in your organization. Where do you begin? How will you approach the...
Top 5 Open Source Security Vulnerabilities in December
What are the top vulnerabilities hit our favorite open source projects this December? While all you hard working folks have hopefully been taking advantage of the jolly month of December for...
Use DevOps to shift Left Your Application Security
A continuous solution for open source management that is pre-integrate into your DevOps cycle is a critical enabler that DevOps teams should insist on implementing.
Top 10 Security Vulnerabilities of 2017
It’s been quite a year. Do you still have any of these vulnerabilities in your products? Application security, and the open source vulnerabilities that can threaten it, were front of mind for many...
This is What OWASP Got Wrong on the 2017 Top 10 Application Security Risks List
OWASP puts the cart before the horse when it comes to how you keep your data safe The Open Web Application Security Project (OWASP) finally released the third — and possibly final — version of...
The Main Application Security Technologies to Adopt by 2018
As hacker attacks on the application layer evolve, the need for application security that provides continuous coverage and real-time protection and remediation becomes a top priority. The tools and pr
Shifting Security Left: 3 DevSecOps Challenges & How to Overcome Them
Software organizations are under tremendous pressure to deliver innovative products and ship updates fast. To keep up with the competitive and ever-rapid release schedule, many software teams are...
How to Navigate Migrating to Cloud in a Regulated Environment
Making the move to public clouds can seem like a Sisyphean task for many financial and healthcare organizations. Beyond covering the usual bases that are involved in the process, they face a set...
How to Choose an Open Source Management Solution
How DevOps Processes Can Promise Blockchain Success
Whether you’re thinking of quitting your day job or wondering how to make sure your kids learn a valuable skill, it appears blockchain technologies are quite a safe bet. According to a recent...
6 Reason Serverless Computing Can Take the Cloud to the Next Level
As we continue to review the buzzwords that were echoing out of all the tech and dev trend forecasts for 2017, this week we will begin to take a closer look at Serverless Computing. Towards the...
Use DevOps to Minimize Application Security Risks