Optimizing software composition analysis for developer workflows with Black Duck Rapid Scan

Optimizing software composition analysis for developer workflows with Black Duck Rapid Scan

Black Duck Rapid Scan enables developers to check for security or policy violations without disrupting development process. The post Optimizing software composition analysis for developer workflows with Black Duck Rapid Scan appeared first on Software Integrity Blog ... Read More
Get earlier, actionable vulnerability insights from Black Duck Security Advisories

Get earlier, actionable vulnerability insights from Black Duck Security Advisories

Identifying security vulnerabilities is only half the battle. To remediate and prioritize them, you need Black Duck Security Advisories. The post Get earlier, actionable vulnerability insights from Black Duck Security Advisories appeared first on Software Integrity Blog ... Read More
Discovery capabilities: A core differentiator for Black Duck SCA

Discovery capabilities: A core differentiator for Black Duck SCA

Stay on top of open source vulnerabilities and license obligations with discovery capabilities from Black Duck. The post Discovery capabilities: A core differentiator for Black Duck SCA appeared first on Software Integrity Blog ... Read More
Demystifying CVSS Scoring

Demystifying CVSS Scoring

The Common Vulnerability Scoring System (CVSS) can help you navigate the constantly growing ocean of open source vulnerabilities. But it’s difficult to lend your trust and put the security of your organization and your customers into the hands of a system that you may know very little about. Let’s take ... Read More
Black Duck continues to expand vulnerability prioritization methods

Black Duck continues to expand vulnerability prioritization methods

Today’s release of Black Duck adds vulnerability impact analysis, which indicates whether your application executes vulnerable code. Let’s look at how this addition further augments your prioritization efforts. The post Black Duck continues to expand vulnerability prioritization methods appeared first on Software Integrity Blog ... Read More