Integrating with SonarQube

By Brian Fox on August 27, 2014 Sonatype Says

3 minute read time

Customers using CLM want to surface known security vulnerabilities and license risk in the same place developers or executives already go to assess the.
Read More...

Hear no Evil, See no Evil, Deploy no Evil

3 minute read time

I was going to start off listing a series of what I think are easy questions that I reckon everyone in technology should be able to answer even if they are.
Read More...

Part 3 – [ ________ ] is the Best Policy

By David Jones on August 18, 2014 open source survey

3 minute read time

In part 1 and part 2 of the '[ ________ ] is the Best Policy' series, we looked at how open source policies can quite often lead to the wrong type of behavior.
Read More...

"Wait! Wait! Don't pwn me!" from Black Hat 2014

By Mark Miller on August 14, 2014 OWASP

1 minute read time

"Wait! Wait! Don't pwn me!" from Black Hat 2014
Read More...

Part 2 - [ ________ ] is the Best Policy

By David Jones on August 13, 2014 open source survey

3 minute read time

In Part 1, ‘[ ________ ] is the Best Policy, we looked at some of the common aspects of an open source policy and discussed how our recent survey discovered.
Read More...

Part 1 - [ ________ ] is the Best Policy

3 minute read time

Open source has been around for donkey's years but until recently the persuasive argument of “many eyeballs” was the guiding policy using open source.
Read More...