In Part 1, ‘[ ________ ] is the Best Policy, we looked at some of the common aspects of an open source policy and discussed how our recent survey discovered that 41% of people think that policies are not enforced. Now in Part 2, we will look at how effective policies are when considering security concerns.
What can the financial services industry learn from the U.S. Department of Homeland Security? In this third segment of my blog series on open source component security as it relates to the recently updated Financial Services Information Sharing and Analysis Center (FS-ISAC) guidelines, I explore the need for speed: humans vs. machines.
We thought it would be interesting to share some of the feedback that we are getting from early CLM customers. Check out the CLM product tour to see more and come back to the blog to post your impressions. Policy & governance “Just by using the CLM we are enforcing policy.” – Dev Manager “A […]
We’re pleased to announce Sonatype CLM (Component Lifecycle Management). Although this is the official release date, we’ve been building off a number of mature technologies and we already have customers in production. The CLM is a culmination of several factors: The Nexus community has been an invaluable source of feedback. Although the repository manager is […]