Syndicated Blog

Blog – WhiteSource
Open Source License Management for Software Vendors
Your Guide to Open Source Vs Proprietary Code Security

Your Guide to Open Source Vs Proprietary Code Security

|
In an age when software relies on open source for faster, more efficient development, the debate over whether or not to use it for building applications would appear to be long over ...
PCI Software Security Framework: All You Need to Know

PCI Software Security Framework: All You Need to Know

|
In January, the Payment Card Industry Security Standards Council (PCI SSC) released a new security framework for software vendors that develop payment applications. The new framework is replacing the current guidelines of ...
Inspiring The Next Generation Of Women In Tech At WhiteSource

Inspiring The Next Generation Of Women In Tech At WhiteSource

|
With International Women’s Day upon us, we wanted to hear from some of the ladies who are leading the way forward at our company on what brought them into this field, their ...
Top 5 New Open Source Vulnerabilities in February 2019

Top 5 New Open Source Vulnerabilities in February 2019

|
It has been said that March comes in like a lion and goes out like a lamb. It’s still early to determine how accurately that applies to this month, but one thing ...
Docker Vulnerabilities

Top 5 Docker Vulnerabilities You Should Know

|
Offering more than just another buzzword, containers have become one of the biggest trends in software development over the past three years. Developers love their ability to package, test, and deploy their ...
bitbucket-whitesource

WhiteSource To Offer New Pipe Integration for Bitbucket

|
Software development is moving faster than ever before, with new versions barreling through the pipeline out to customers at increasingly higher speed. Supporting this wave of coding innovation is the agile CI/CD ...
Bulma- WhiteSource’s Open Source Project of the Month for February 2019

Bulma- WhiteSource’s Open Source Project of the Month for February 2019

|
Continuing our series of innovative and useful open source projects that you should know, we spoke this month with the creators of Bulma. First released in early January 2016 under the MIT ...
Experience over Best Practices- Interview with CyberArk’s WhiteHat Hacker Len Noe

Experience over Best Practices- Interview with CyberArk’s WhiteHat Hacker Len Noe

|
Every week, a new data breach makes headlines. Target, Yahoo, Equifax, JP Morgan Chase, and many more have all been subject to massive information data breaches compromising the personal information of millions ...
DevSecOps

DevSecOps: From Theory to Practice

|
DevSecOps has become one of the hottest buzzwords in the DevOps ecosystem over the past couple of years. In the abstract, it's easy to understand what DevSecOps means and why people care ...
Container Security Scanning

3 Crucial Tips for Smarter Container Security Scanning

|
Like most trends in our industry is, first we fall in love with how much faster or smarter they allow us to get things done. It is only later after we are ...
Loading...