Research Shows Glaring Mobile App Security Issues

The COVID-19 pandemic has driven the world online in remarkable ways, forever changing the way we work, learn, and interact. The increased reliance on mobile applications is starkly apparent; mobile app usage grew 40% year-over-year in the second quar… Continue reading Research Shows Glaring Mobile App Security Issues

Four requirements for open source vulnerability management in a DevOps environment

Most applications contain open source code, which can expose companies to risks if left unchecked. Make the most of your open source vulnerability management with the right approach and tooling.
The post Four requirements for open source vulnerabilit… Continue reading Four requirements for open source vulnerability management in a DevOps environment

Need a vulnerability assessment yesterday? Consider a Black Duck Audit

When you don’t have any time or resources to spare, Black Duck Audits provide a deep, accurate, rapid vulnerability assessment, plus remediation guidance.
The post Need a vulnerability assessment yesterday? Consider a Black Duck Audit appeared f… Continue reading Need a vulnerability assessment yesterday? Consider a Black Duck Audit

The advanced license compliance functionality you didn’t know your SCA tool needed

Open source license noncompliance can have severe implications. Here are four advanced license compliance features that help protect your proprietary code.
The post The advanced license compliance functionality you didn’t know your SCA tool need… Continue reading The advanced license compliance functionality you didn’t know your SCA tool needed

How do you effectively remediate the increasing sea of vulnerabilities?

With applications containing more and more open source, and 40+ open source vulnerabilities disclosed daily, how do you prioritize your remediation efforts?
The post How do you effectively remediate the increasing sea of vulnerabilities? appeared firs… Continue reading How do you effectively remediate the increasing sea of vulnerabilities?

Cyber security audits top due diligence checklists

In a study by (ISC)2, all executives and M&A professionals surveyed agreed that cyber security audits have become standard practice in tech due diligence.
The post Cyber security audits top due diligence checklists appeared first on Software Integ… Continue reading Cyber security audits top due diligence checklists

Open source audits: The secret ingredient for successful M&A

Identifying open source in the target’s codebase is essential to M&A transactions involving software. Open source audits go far beyond what SCA can provide.
The post Open source audits: The secret ingredient for successful M&A appeared f… Continue reading Open source audits: The secret ingredient for successful M&A