Extending Black Duck’s capability with Red Hat OpenShift to scan Red Hat Quay images

The Black Duck Connector for OpenShift, which identifies and tags open source components, can now scan Red Hat Quay container registry images via a webhook.
The post Extending Black Duck’s capability with Red Hat OpenShift to scan Red Hat Quay i… Continue reading Extending Black Duck’s capability with Red Hat OpenShift to scan Red Hat Quay images

Extending Black Duck’s capability with Red Hat OpenShift to scan Red Hat Quay images

The Black Duck Connector for OpenShift, which identifies and tags open source components, can now scan Red Hat Quay container registry images via a webhook.
The post Extending Black Duck’s capability with Red Hat OpenShift to scan Red Hat Quay i… Continue reading Extending Black Duck’s capability with Red Hat OpenShift to scan Red Hat Quay images

[Webinars] “Open source” management and secure development

Learn about management practices inspired by open source principles and how a structured approach to secure software development is the best way forward.
The post [Webinars] “Open source” management and secure development appeared first on… Continue reading [Webinars] “Open source” management and secure development

Taking the next step in your application security program

Already using static code analysis? Try boosting your application security program with software composition analysis to automate open source management.
The post Taking the next step in your application security program appeared first on Software Int… Continue reading Taking the next step in your application security program

Coverity & Black Duck together. Better. Faster. Stronger.

Using static code analysis (SAST) and software composition analysis (SCA) together makes your software development process better, faster, and stronger.
The post Coverity & Black Duck together. Better. Faster. Stronger. appeared first on Software … Continue reading Coverity & Black Duck together. Better. Faster. Stronger.

[Webinars] DevSecOps best practices, AppSec tools, and the year in open source

Learn more about DevSecOps best practices, application security tools and features, and key legal developments related to open source in 2019.
The post [Webinars] DevSecOps best practices, AppSec tools, and the year in open source appeared first on So… Continue reading [Webinars] DevSecOps best practices, AppSec tools, and the year in open source

How to Use Sonatype OSS Index to Identify Security Vulnerabilities

It’s nearly impossible to build a modern application without relying on third-party libraries. Open source software has been an amazing boom to software development. It’s been instrumental in allowing developers to build increasingly m… Continue reading How to Use Sonatype OSS Index to Identify Security Vulnerabilities

Open source for lawyers: Ongoing implications of open source use

Ongoing legal considerations associated with open source use include license enforcement, dual licensing, and deciding whether to license out your own code.
The post Open source for lawyers: Ongoing implications of open source use appeared first on So… Continue reading Open source for lawyers: Ongoing implications of open source use

Open source for lawyers: Challenges of open source use

Open source is widespread because it’s easy to use. But it comes with unique security challenges, and poor open source management can be a costly liability.
The post Open source for lawyers: Challenges of open source use appeared first on Softwa… Continue reading Open source for lawyers: Challenges of open source use

[Webinars] Container security, tool misuse and abuse, open source in M&A

Learn how containerization changes the security paradigm, how to prevent security tool misuse, and what M&A participants should know about open source.
The post [Webinars] Container security, tool misuse and abuse, open source in M&A appeared … Continue reading [Webinars] Container security, tool misuse and abuse, open source in M&A