Why developers need a supplemental source to NVD vulnerability data

Why developers need a supplemental source to NVD vulnerability data

The NVD is a good source for open source vulnerability data. But with an average 27-day reporting delay, it shouldn’t be your only source of information. The post Why developers need a ...
[Webinars] Vulnerability reports, application security for DevOps and CI/CD

[Webinars] Vulnerability reports, application security for DevOps and CI/CD

Learn how vulnerability reports can help you fix critical vulnerabilities effectively, and the essentials of application security for DevOps and CI/CD. The post [Webinars] Vulnerability reports, application security for DevOps and CI/CD ...
SAST and SCA: Why use both?

SAST and SCA: Why use both?

If you use an SCA tool, why should you use a SAST tool as well? Let’s discuss what each tool can and can’t do and how they complement each other. The post ...
[Webinars] SAST and SCA together, managed pen testing for risk management

[Webinars] SAST and SCA together, managed pen testing for risk management

Learn how to combine SAST and SCA to find and fix more security and quality issues, and how managed pen testing supports your risk management strategy. The post [Webinars] SAST and SCA ...
How do you effectively remediate the increasing sea of vulnerabilities?

How do you effectively remediate the increasing sea of vulnerabilities?

With applications containing more and more open source, and 40+ open source vulnerabilities disclosed daily, how do you prioritize your remediation efforts? The post How do you effectively remediate the increasing sea ...
How to Cyber Security: Software is manufacturing

How to Cyber Security: Software is manufacturing

Modern software is a bit like manufacturing: gluing open source components together using proprietary code and tracking everything with a bill of materials. The post How to Cyber Security: Software is manufacturing ...
[Webinar] Effective Vulnerability Remediation Requires More Than One Data Point

[Webinar] Effective Vulnerability Remediation Requires More Than One Data Point

With advanced policy management and best-in-class vulnerability reports, developers can fix the most critical vulnerabilities quickly and effectively. The post [Webinar] Effective Vulnerability Remediation Requires More Than One Data Point appeared first ...
Code quality and maintenance: Emerging risks of open source use

Code quality and maintenance: Emerging risks of open source use

You know that static analysis can find code quality defects in your proprietary code. But what are you doing to manage your open source code quality risk? The post Code quality and ...
Find and fix open source and proprietary code security defects in the IDE with Polaris and Code Sight

Find and fix open source and proprietary code security defects in the IDE with Polaris and Code Sight

With new SCA capabilities, the Code Sight IDE plugin detects vulnerabilities (CVEs) in the open source you use, alongside weaknesses in proprietary code. The post Find and fix open source and proprietary ...
[Webinars] Black Duck on VMware Cloud and open source scans

[Webinars] Black Duck on VMware Cloud and open source scans

Learn about the addition of Black Duck to VMware Cloud Marketplace and the benefits and limitations of different types of open source scans. The post [Webinars] Black Duck on VMware Cloud and ...