Git is celebrating its 17th anniversary. The technology is at the core of DevOps, with 85% of DevOps professionals relying on it, but there’s more to Git than meets the eye, and devs are missing out on its decentralized work capabilities. In this article, Brendan O’Leary takes a look at the road ahead.
We spoke with Paul Farrington, CPO at Glasswall about Content Disarm and Reconstruction technology, how it is used, and how it helps against file-based threats. Paul gives his advice regarding security measures, file-based threats, and how developers can best achieve top-notch security practices.
What is the current state of enterprise open source, and how has this been changed with the pace of digital transformation? This article looks at Red Hat’s State of Enterprise Open Source report and digs into the top trends in the enterprise open source community during this time of change and growth.
In its 30 years of existence, the Linux kernel has had a massive impact on the modern computing landscape – revolutionizing what’s possible for operating systems and allowing countless tinkerers to get their hands dirty in the process. In this article, Cara Nolte, Training Architect at A Cloud Guru, a Pluralsight Company, discusses the importance of the Linux kernel and why it’s here to stay.
We spoke with Ax Sharma, Senior Security Researcher & Advocate at Sonatype about recent vulnerabilities: Log4j, and colors.js and faker.js. Are we at a turning point in open source software? What were the impacts and how likely is another similar attack in the future?
Deciding on software updates or migration plans when OSS community long-term support ends and just before going into EOL can be difficult and time-consuming. It is tempting to keep heads down and carry on working with EOL OSS in the hope that nothing will happen, or if it does, it is going to be someone else’s problem.
Effective collaboration is a simple yet effective tool in building resilience to better protect those who rely on cyber professionals to keep them, and their businesses, secure. How though, as we move forward, do we keep this sense of collaboration from waning, and ensure the community continues to share and tap into each other’s best practices to improve solutions and applications?
What does 2022 hold for open source and OpenTelemetry? Which cutting-edge technologies should you be paying attention to in 2022? We asked the experts about their predictions for the coming year. Stay ahead of the curve and learn how to plan strategically in the new year.
When developing new features of a complex, distributed, massively scalable software system, it is easy to accidentally degrade its performance, even despite being very careful. Regular code reviews, static code analysis, quality, and performance testing are not enough. In this post, we show how Hunter can be used to analyze thousands of performance metrics regularly and reliably flags performance changes.
We spoke to Chris Eng from Veracode about the UA-Parser-JS NPM Open Source library hack. What happened, what was the outcome, and what are unique open source security concerns? Chris Eng gives advice on how we can boost our open source security practices and avoid malicious code.
What is OpenSilver? We spoke with Giovanni Albani about the open source reimplementation of Silverlight that can run on all modern web browsers. Learn how it works under the hood, how you can migrate all of your Silverlight projects, and what’s on the roadmap for its future.
Maty Siman, founder and CTO at Checkmarx spoke with us about how ahead-of-time analysis helps application security. Learn what security red flags we should look out for in open source code, how machine learning models can detect security vulnerabilities in code, and more.
Are we sitting on major security vulnerabilities right now? How has security changed in the past 20 years? We interviewed Ilkka Turunen, Sonatype Field CTO and Muzaffer Pasha, Security Evangelist at Traceable about how to achieve better security in open source and in your organization.