Top 4 software development methodologies

Top 4 software development methodologies

Explore the top four software development methodologies - Waterfall, Rapid Application, Agile, and DevOps - and discover the method best suited for your project.The post Top 4 software development methodologies appeared first on Software Security ... Read More
How to generate a software bill of materials

How to generate a software bill of materials

Learn how to effortlessly generate an accurate SBOM with Synopsys Black Duck SCA. The post How to generate a software bill of materials appeared first on Software Security ... Read More

Eliminate malicious code in your software supply chain

What is malicious code? What makes it dangerous?  Learn how can you detect it and keep it out of your software supply chain ... Read More
Detection strategies to unmask the source of malicious code

Detection strategies to unmask the source of malicious code

Having malicious code detection strategies in place is critical to keeping your software supply chain secure.  ... Read More
Open source software: A pillar of modern software development

Open source software: A pillar of modern software development

Open source software provides companies with a competitive edge but when used incorrectly, it can lead to risks in the software supply chain ... Read More
Black Duck’s New Year’s Resolution

Black Duck’s New Year’s Resolution

The new Black Duck SCA release offers enhancements to help organizations to better understand the potential risks in their software supply chain ... Read More
Prioritizing open source vulnerabilities in software due diligence

Prioritizing open source vulnerabilities in software due diligence

Black Duck Security Advisories provide actionable advice and details about open source vulnerabilities to help you improve your remediation activities ... Read More
Establishing trust in your software supply chain with an SBOM

Establishing trust in your software supply chain with an SBOM

A software Bill of Materials or SBOM provides transparency into an organization’s software, protecting it from supply chain risks. The post Establishing trust in your software supply chain with an SBOM appeared first on Application Security Blog ... Read More
Critical aspects of securing your enterprise applications

Critical aspects of securing your enterprise applications

Mitigating the risks associated with complex enterprise applications requires securing every component at every stage of the life cycle. The post Critical aspects of securing your enterprise applications appeared first on Application Security Blog ... Read More
What the cybersecurity executive order means for the private sector

What the cybersecurity executive order means for the private sector

As we await new guidelines from NIST, we review the impact the federal government and previous cybersecurity executive orders have had on setting new policies. The post What the cybersecurity executive order means for the private sector appeared first on Software Integrity Blog ... Read More