Software Composition Analysis (SCA)
Making SCA part of your AST Strategy
Open source software is now used in nearly every organization, which makes it critical to know your code. Learn how an SCA tool can help you. The post Making SCA part of ...
Black Duck continues to expand vulnerability prioritization methods
Today’s release of Black Duck adds vulnerability impact analysis, which indicates whether your application executes vulnerable code. Let’s look at how this addition further augments your prioritization efforts. The post Black Duck ...
An introduction to installing Black Duck
Get started with the Dockerized Black Duck installation. This post outlines workplace specifications, tools, and steps for installing Black Duck. The post An introduction to installing Black Duck appeared first on Software ...
The advanced license compliance functionality you didn’t know your SCA tool needed
Open source license noncompliance can have severe implications. Here are four advanced license compliance features that help protect your proprietary code. The post The advanced license compliance functionality you didn’t know your ...
Why developers need a supplemental source to NVD vulnerability data
The NVD is a good source for open source vulnerability data. But with an average 27-day reporting delay, it shouldn’t be your only source of information. The post Why developers need a ...
[Webinars] Vulnerability reports, application security for DevOps and CI/CD
Learn how vulnerability reports can help you fix critical vulnerabilities effectively, and the essentials of application security for DevOps and CI/CD. The post [Webinars] Vulnerability reports, application security for DevOps and CI/CD ...
SAST and SCA: Why use both?
If you use an SCA tool, why should you use a SAST tool as well? Let’s discuss what each tool can and can’t do and how they complement each other. The post ...
[Webinars] SAST and SCA together, managed pen testing for risk management
Learn how to combine SAST and SCA to find and fix more security and quality issues, and how managed pen testing supports your risk management strategy. The post [Webinars] SAST and SCA ...
How do you effectively remediate the increasing sea of vulnerabilities?
With applications containing more and more open source, and 40+ open source vulnerabilities disclosed daily, how do you prioritize your remediation efforts? The post How do you effectively remediate the increasing sea ...
How to Cyber Security: Software is manufacturing
Modern software is a bit like manufacturing: gluing open source components together using proprietary code and tracking everything with a bill of materials. The post How to Cyber Security: Software is manufacturing ...

