Top 4 software development methodologies
Explore the top four software development methodologies - Waterfall, Rapid Application, Agile, and DevOps - and discover the method best suited for your project.The post Top 4 software development methodologies appeared first on Software Security ... Read More
How to generate a software bill of materials
Learn how to effortlessly generate an accurate SBOM with Synopsys Black Duck SCA. The post How to generate a software bill of materials appeared first on Software Security ... Read More
Eliminate malicious code in your software supply chain
What is malicious code? What makes it dangerous? Learn how can you detect it and keep it out of your software supply chain ... Read More
Detection strategies to unmask the source of malicious code
Having malicious code detection strategies in place is critical to keeping your software supply chain secure. ... Read More
Open source software: A pillar of modern software development
Open source software provides companies with a competitive edge but when used incorrectly, it can lead to risks in the software supply chain ... Read More
Black Duck’s New Year’s Resolution
The new Black Duck SCA release offers enhancements to help organizations to better understand the potential risks in their software supply chain ... Read More
Prioritizing open source vulnerabilities in software due diligence
Black Duck Security Advisories provide actionable advice and details about open source vulnerabilities to help you improve your remediation activities ... Read More
Establishing trust in your software supply chain with an SBOM
A software Bill of Materials or SBOM provides transparency into an organization’s software, protecting it from supply chain risks. The post Establishing trust in your software supply chain with an SBOM appeared first on Application Security Blog ... Read More
Critical aspects of securing your enterprise applications
Mitigating the risks associated with complex enterprise applications requires securing every component at every stage of the life cycle. The post Critical aspects of securing your enterprise applications appeared first on Application Security Blog ... Read More
What the cybersecurity executive order means for the private sector
As we await new guidelines from NIST, we review the impact the federal government and previous cybersecurity executive orders have had on setting new policies. The post What the cybersecurity executive order means for the private sector appeared first on Software Integrity Blog ... Read More