Home

  • The Equifax Hack: 6 Months Later, What Did We Learn?

    The Equifax Hack: 6 Months Later, What Did We Learn?

    Read Article
  • Open Source Licensing Trends: 2017 vs. 2016

    Open Source Licensing Trends: 2017 vs. 2016

    Read Article
  • Top 5 New Open Source Vulnerabilities in March 2018

    Top 5 New Open Source Vulnerabilities in March 2018

    Read Article
  • RSA 2018- What’s Hot in the Cyber Security Space1:03:08

    RSA 2018- What’s Hot in the Cyber Security Space

    Watch Video
  • March Madness Comes to GitHub

    March Madness Comes to GitHub

    Cheer on your favorite repositories as they go for the win Few things in the world of programming are as universal as GitHub. Boasting over 4 million users, the code-sharing site prides itself on...

    Read Article
  • SC Magazine - 5 Things Every CISO Needs To Know About Open Source Security1:01:51

    SC Magazine - 5 Things Every CISO Needs To Know About Open Source Security

    Watch Video
  • Strategies for Improving Enterprise Application Security1:03:55

    Strategies for Improving Enterprise Application Security

    Watch Video
  • How to Keep Your Apps Secure After Moving to SaaS From On-Prem

    How to Keep Your Apps Secure After Moving to SaaS From On-Prem

    The world of how work gets done has changed dramatically, moving at a faster pace with a far greater emphasis on collaboration for improving productivity. Today, virtually all software has a cloud...

    Read Article
  • Top Five Prep Tips for Technical Due Diligence

    Top Five Prep Tips for Technical Due Diligence

    We all dream of creating the next big thing, getting that investment that will help get us over the finish line, landing the partnership with one of the big players, getting acquired by one of the...

    Read Article
  • Staying on Top of Your Organization’s Technical Debt

    Staying on Top of Your Organization’s Technical Debt

    The famous, American poet Emily Dickinson is credited back in the 19th century as stating that “forever is composed of nows.” Today, the world of software is all about rapid releases, innovative...

    Read Article
  • Top 5 New Open Source Vulnerabilities for February 2018

    Top 5 New Open Source Vulnerabilities for February 2018

    Top 5 New Open Source Vulnerabilities in February 2018 Some things never change. For starters, February started with Punxsutawney Phil, the hero of Groundhog Day, once again coming out of...

    Read Article
  • Git Much? The Top 10 Companies Contributing to Open Source

    Git Much? The Top 10 Companies Contributing to Open Source

    When it comes to a developer’s work space, you will tend to find many open tabs with different sites which fall under task management tools. Think Asana, Slack, Trello, and others. The one...

    Read Article
  • How Can We Make Sure We’re Using High-Quality Open Source Components?

    How Can We Make Sure We’re Using High-Quality Open Source Components?

    Way back in the day (in software production speak that means three years ago), professionals in our ecosystem were still going back and forth about free and open source software vs. proprietary....

    Read Article
  • MiFID II Reforms and Their Impact on Technology and Security

    MiFID II Reforms and Their Impact on Technology and Security

    In the latest round of regulations for companies doing business in the European Union, MiFID II will require some important overhauls for how data is stored The European Union’s recent set of...

    Read Article
  • 7 Facts Every CISO Needs To Know About Open Source Security

    7 Facts Every CISO Needs To Know About Open Source Security

    With great power comes great responsibility, and securing your organization’s open source components comes with a different set of considerations that every CISO should know.

    Read Flipbook
  • Top 5 New Open Source Vulnerabilities of January 2018

    Top 5 New Open Source Vulnerabilities of January 2018

    Top 5 New Open Source Vulnerabilities for January 2018 According to our database, January brought in some new and nasty open source vulnerabilities. Which ones hit us the hardest?   It seems like...

    Read Article
  • Top 15 Security Experts to Follow on Twitter in 2018

    Top 15 Security Experts to Follow on Twitter in 2018

    When it comes to finding out the latest and greatest news and announcements online, Twitter is still the go to place when it comes to application security. You have the opportunity to learn and...

    Read Article
  • The State Of Application Security 2018 and Beyond

    The State Of Application Security 2018 and Beyond

    Before slowing down development and causing customers to revolt, security and risk pros should read this report to understand the current state of application security and how emerging techniques supp

    Read Flipbook
  • NIST 800-171 Sets New Standards for CUI Data Protection

    NIST 800-171 Sets New Standards for CUI Data Protection

    In a move that is likely to raise the blood pressure for more than a few security professionals up a couple points, the U. S. federal government has now determined that companies need to take...

    Read Article
  • WhiteSource Wins FinancesOnline Reviews 2018 Rising Star and Great User Experience Award for IT Management Software!

    WhiteSource Wins FinancesOnline Reviews 2018 Rising Star and Great User Experience Award for IT Management Software!

    Read Article
  • loading
    Loading More...