
[Webinars] Software supply chain and open source scans
Learn how different open source scans create different value for M&A transactions, and how binary analysis can help you secure your software supply chain.
Why All Open Source Scans Aren’t Created Equal
Understanding the risks associated with open source software has become the norm in tech due diligence, but not all approaches are created equal. Are you approaching open source diligence in the most efficient and effective way possible? Do you understand the difference between a point-in-time open source analysis for M&A and ongoing open source management?
Learn more in our webinar about different open source scans
Join us for this live webinar and learn how a purpose-built M&A open source audit differs from open source management tools and why it matters in tech due diligence. We’ll cover:
- The types of risk around open source software
- Why depth of analysis matters, and what it results in during M&A diligence
- Why accuracy, reporting, and expert human analysis are keys to thorough diligence
Don’t miss this informative webinar. Register today.
What: Why All Open Source Scans Aren’t Created Equal
When: July 24 @ 11 a.m. EDT
Who: Phil Odence, GM of Black Duck Audits, Synopsys; Emmanuel Tournier, senior manager, Synopsys
Is Your Software Supply Chain a Security Blind Spot?
One of the biggest challenges companies face with third-party software is lack of visibility into the open source libraries used in the software they embed in their products. Over the last year, major security breaches have been attributed to exploits of vulnerabilities in open source frameworks used by Fortune 100 companies in education, government, financial services, retail, and media.
These incidents shine a light on the need for organizations to carefully manage the open source used in the third-party software they consume. The goal is to protect themselves—and their customers—from the consequences of catastrophic security breaches.
Learn how to secure your supply chain in our software supply chain webinar
This session will:
- Cover the key differences between identifying open source in source code versus binaries
- Outline key use cases for binary analysis as part of a comprehensive approach to open source
- Explain the next step toward making sure you avoid potentially costly security breaches
Don’t miss this informative webinar. Register today.
What: Is Your Software Supply Chain a Security Blind Spot?
When: July 25 @ 12 p.m. EDT
Who: Lisa Bryngelson, senior product manager, at Synopsys
*** This is a Security Bloggers Network syndicated blog from Software Integrity Blog authored by Synopsys Editorial Team. Read the original post at: https://www.synopsys.com/blogs/software-security/webinars-software-supply-chain-open-source-scans/