Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Open Source

Find open source vulnerabilities in containers with Black Duck Binary Analysis | Synopsys

Discover how to identify open source components and vulnerabilities in various software binaries including container images, mobile apps, and embedded software with Black Duck Binary Analysis What’s covered?

Track and manage open source risks across your application portfolio with Black Duck SCA | Synopsys

Learn how your security teams can take a proactive approach to managing open-source risk using Black Duck. Join us as we explore the process of analyzing scan results, addressing new CVEs, and prioritizing remediation efforts.

Find secure, compliant, and high-quality OSS components with Black Duck SCA | Synopsys

In this video, we take you on a tour through Black Duck’s SCA tool to show you how you can find and select the most high-quality open-source components for your applications. Key Highlights: Ready to save time and innovate with confidence? Visit synopsys.com/blackduck to learn more about obtaining visibility into component health and viability.

Build an SBOM in under 30 seconds with Black Duck SCA | Synopsys

In this video, we show you how easy it is to create an open source Software Bill of Materials (SBOMs) using Black Duck. Join us as we demonstrate how to effortlessly generate an SBOM in under 30 seconds, empowering enterprise teams to prioritize SBOM creation.

Priorities from the OpenSSF Secure Open Source Software Summit 2023

Snyk has been a long-time active participant in and sponsor of the Open Source Security Foundation (OpenSSF). We’re there because we believe in supporting its mission of securing the open source ecosystem. A recent summit meeting convened by the OpenSSF with the White House brought together various US Government departments for a chat about open source security.

From diligence to integration: How software audits inform post-close M&A strategies

Software due diligence is an all-important aspect of any merger and acquisition (M&A) transaction, and in the tech M&A world, a target’s software assets are a significant part of the valuation. This due diligence process should identify a target company’s open source license obligations, application security and code quality risks, and the organization, processes, and practices that compose the software development life cycle.

Securing the Software Supply Chain: Key Findings From the Mend Open Source Risk Report

Open source vulnerabilities are in permanent growth mode. A significant quarterly increase in the number of malicious packages published in registries such as npm and rubygems have shown the increasing need to protect against this trending attack. At the same time, companies struggle to close the remediation gap on known vulnerable open source code. It’s all in The Mend Open Source Risk Report, which details these and other significant risks posed by the ongoing rise in open source vulnerabilities and software supply chain attacks.

Navigating the Open Source Landscape: Finding Your First Contribution

🕵️‍♂️ Embarking on your journey and learning how to contribute to open source is an exciting step towards honing your programming skills, collaborating with experts, and giving back to the global developer community. However, the challenge often lies in finding the right project to kickstart your open-source journey.

Is Open Source Software Dead?

Open source software (OSS) has driven technological growth for decades due to its collaborative nature and ability to share information rapidly. However, major OSS security vulnerabilities like Log4j, Heartbleed, Shellshock and others have raised concerns about the security and sustainability of similar projects. At the same time, major open source-based companies have changed their OSS licenses, like MongoDB, Elastic (formerly ElasticSearch), Confluent, Redis Labs and most recently, HashiCorp.