Nexus and RunDeck: Tools for DevOps


June 5, 2014 By
Mark Miller
Nexus and RunDeck

In today’s Nexus Live Broadcast, Damon Edwards and his team from SimplifyOps introduced us to RunDeck, open source software that helps automate routine operational procedures in data center or cloud environments. He is seeing Nexus in many of his enterprise environments, so I thought it would be interesting to see an overview the product and […]

Continue reading...

5 Things You Need to Know About Open Source Components


June 4, 2014 By
Mark Miller
Component Vulnerability Stats

You can’t get away from it. Thousands of open source components are being used in every industry, every day, to quickly build and deploy applications. For those not in the security industry, it’s hard to keep track of what is being done in this field to manage and monitor open source usage. This article is the first in a series where we will talk about open source in layman terms, identify how prevalent open source is in the modern development environment and how teams are approaching the management of such a multi-headed hydra.

Continue reading...

RebelLabs Java Survey Results: Developers Love Nexus


June 2, 2014 By
Derek Weeks
Nexus Leaderboard

Another informative and well-presented RebelLabs survey has hit the streets. Their 2014 Java Tools and Technologies Landscape report was just released and hats off to them for ‘their better than ever response rate’ and their good will for charity donations from each completed survey response. This year’s survey covers more than a dozen different tool/technology segments within the Java industry.

Continue reading...

Replace plain text username and password with a user token – The Nexus 2 Minute Challenge


By
Mark Miller
The Nexus 2 Minute Challenge

In this segment of the Nexus 2 Minute Challenge,  we’re going to look at the Nexus User Token feature. The user token relates to the username and password that is used to connect to Nexus. In this  example, there is a Maven .xml file  where the username and password is in clear text.  This is […]

Continue reading...

Cheeseburger Risk: Not for the Faint of Heart


May 20, 2014 By
Derek Weeks
Cheeseburger Risk

If you had a heart attack, would you stop eating cheeseburgers? For most people, the answer is “No”. A recent survey of 1,000 survivors found that 60 percent of heart attack victims weren’t sticking to a healthy diet and about 30 percent still had high cholesterol and blood pressure. Hey, old habits (especially the tasty ones) die hard. Funny thing is, the same behavior for those who have suffered a heart attack is found in application security. If you have been breached, chances are you have not changed your security diet.

Continue reading...

On the Shoulders of Giants: Influential Books for Software Developers


May 16, 2014 By
Jamie Whitehouse
Shoulders of Giants

While there are many books I have read during my career as a software engineer, there are a handful that have been influential in my thinking. Here are my top 2 books for software developers. If you’ve read them before, you might want to read them again through the experience lens of your development career.

Continue reading...

4 Open Source Components You Need to Update Right Now


May 7, 2014 By
Brian Fox
Component Vulnerability Stats

Heartbleed has put the security community on notice: it is time to take a harder look at the security status of open source components and frameworks. After doing a little industry research on downloads from the (Maven) Central Repository, I’m sitting here with my jaw hanging open. Over 46 million Java-based open source components containing known vulnerabilities were downloaded from the Central Repository in 2013*.

Continue reading...