With a software bill of materials (software BOM), you can respond quickly to the security, license, and operational risks that…
Smart organizations in the business of building software need to use a mix of application testing tools to ensure their…
Managing open source risk is essential today, when open source use is abundant but can threaten your business. Here are…
From vulnerability detection to API security, these nine topics hit the highlights from our coverage of software security and quality…
The U.S. House Committee on Oversight and Government Reform has more than a few things to say about responsible enterprise…
Explore 10 critical cloud security threats: data breaches, human error, data loss with no backup, insider threats, DDoS attacks, insecure…
Today’s software contains on average more than 50% open source. That’s why organizations with foresight are including software composition analysis…
Most companies involved with technology M&A understand the importance of open source risks in software. Today’s software contains significant amounts…
In August I wrote about a new Apache Struts vulnerability that affected Struts 2.3 and Struts 2.5. Apache Struts, an open…
We wind up the month of August with stories on the latest Apache Struts hack—bad news, if you remember Equifax—and…