Learn about the story behind the largest data breach to date. Understand the root cause, the timeline and why it was preventable.

Stay up to date, subscribe to our newsletter today!
Other content in this Stream

What you need to know in order to set up an effective and comprehensive vulnerability management process in your organization.

Software supply chain attacks are increasing. Learn what a software supply chain attack is, and about the recent attacks.

How many times have you heard that "open source is not secure." We are here to dispel this and other open source software security concerns.

API security is an essential part of application security in a digitally transformed world.

Find the top security conferences to visit in 2021, virtually or in-person

To help you stay on top of your open source security, here is our list of top 10 open source security vulnerabilities in 2020.

What is application security testing orchestration and why it is crucial in helping organizations make sure all potential risks are tracked and addressed.

Kubernetes security should be a primary concern and not an afterthought. Learn how to avoid risks by applying security best practices.

Why is microservices security important? Key principles and best practices to ensure your microservices architecture is secure.

In this article we explain what Software Composition Analysis tool is and why it should be part of your application security portfolio.

Learn all about white box testing: how it’s done, its techniques, types, and tools, its advantages and disadvantages, and more.

All about application security - why is the application layer the weakest link, and how to get application security right.

Top tips for getting started with WhiteSource Software Composition Analysis to ensure your implementation is successful.

Secure your organization's software by adopting these top 10 application security best practices and integrating them into your software development life cycle.

How prioritization can help development and security teams minimize security debt and fix the most important security issues first.

All about Eclipse SW360 - an application that helps manage the bill of materials — and its main features.

Why you shouldn't track open source components usage manually and what is the correct way to do it.

What are the different types of black box testing, how is it different from while box testing, and how can black box testing help you boost security?

Software Composition Analysis software helps manage your open source components. Here are 7 questions you should ask before buying an SCA solution.