Known Open Source Vulnerabilities In Reusable Software Components: The Golden Goose For Hackers That Keeps On Giving

Known Open Source Vulnerabilities In Reusable Software Components: The Golden Goose For Hackers That Keeps On Giving

|
Hackers love a good puzzle. Hacker culture is rooted in finding ways to improve on code, and unravel challenges with innovative workarounds or alterations. However when it comes to the business of hacking a target, cyber criminals are all about finding the path of least resistance. As entrance points like ... Read More
Introducing the 3rd Generation of Software Composition Analysis

Introducing the 3rd Generation of Software Composition Analysis

|
Software Composition Analysis tools were created to help companies take control of their open source usage, gaining actionable insights based on real visibility over the open source components in their inventory and products. Where as the 1st generation offered legal teams a level of assurance that they were not using ... Read More
How does GDPR impact open source security expectations?

How does GDPR impact open source security expectations?

|
Your inbox is probably jammed full of emails talking about GDPR, the European Union’s comprehensive data privacy regulation regime that is set to come into effect on May 25. The driving force behind GDPR is to formalize data protections across the European Union, giving citizens better control over how their ... Read More