Tag: code vulnerabilities
Backslash Security Extends Reach of Application Security Platform
Making the Backslash application security platform even more secure with news of added support as well as a revamped, simpler user interface ...
ActiveState Makes All Tiers of Curated Artifact Repository Service Free
ActiveState today announced it is making all tiers of its ActiveState Artifact Repository service available for free for a limited time. The move aims to enable organizations to better secure open source ...
GraphQL Vulnerability Analysis: The Top Threats
Publicly available vulnerability data can be a goldmine for insights into how DevOps and DevSecOps teams can prioritize threats and improve security across the pipeline. With this in mind, Inigo recently performed ...
The Two Types of Code Vulnerabilities
Spell checkers, grammar checkers and predictive keyboards all help reduce errors in written communication, but in a creative medium where writers need to innovate new expressions, nothing can eliminate all errors. The ...
DevOps’ Role in Fixing Software Vulnerabilities
From the beginning, application development has required that software developers deal with bugs, vulnerabilities and other issues. But problems encountered under the DevOps model tend to be more manageable since the updates ...
Shifting Left With DevSecOps: ESG Report Exposes Difficulties
A recent report asks the tough questions about DevSecOps adoption, and the results are surprising In a world of increasing development velocity, companies are placing more responsibility on developers to enact quick ...
Synopsys Advances DevSecOps via IDE Plugin
Synopsys has extended the static application security testing (SAST) and software composition analysis (SCA) of the Code Sight plugin it makes available for integrated development environments (IDEs). The latest iteration of Code ...
How Secure is Open Source for DevOps? 5 Considerations
Open source libraries and frameworks have important roles to play in a DevOps culture that emphasizes shorter development life cycles, collaboration and innovation. However, it’s vital not to neglect the security of ...