Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more Today, software supply chain security ...
The idea of a lone programmer relying on their own genius and technical acumen to create the next great piece of software was always a stretch. Today it is more of a myth than ever. Competitive market ...
The Linux Foundation and Harvard's Lab for Innovation Science this week released the rankings of the top 500 open source projects in two major ecosystems in the first step toward cataloging the ...
The proportion of open source codebases with vulnerabilities has continued to remain level over the past two years, but the number of applications with high-risk vulnerabilities has dropped to its ...
WhiteSource, a platform that companies such as Microsoft, IBM, and Comcast use to secure their open source software components, has raised $75 million in a series D round of funding. Founded in 2011, ...
The open-source development ecosystem has experienced a significant rise in malicious software components, putting enterprises on high alert for software supply chain attacks. Malware is infiltrating ...
Maury Cupitt, regional vice president of sales engineering at Sonatype, said government agencies should understand the importance of visibility and automation in the detection and mitigation of risks ...
SARATOGA, Calif.--(BUSINESS WIRE)--Lineaje, a leader in continuous software supply chain security management, today unveiled Open-Source Manager (OSM). The comprehensive, first-of-its-kind solution ...
White House and OMB initiatives are driving security concerns around open source because while it is a powerful tool, it needs to be managed effectively, our expert writes. Against a backdrop of ...
Software composition analysis (SCA) refers to obtaining insight into what open-source components and dependencies are being used in your application, and how—all in an automated fashion. This process ...
Open source code for commercial software applications is ubiquitous, but so is the risk Your email has been sent It was almost exactly one year ago that experts found ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results