Skip Navigation

How a Software Bill of Materials Uncovers Known Vulnerabilities

3 minute read time

How a Software Bill of Materials Uncovers Known Vulnerabilities
Read More...

Talking Turkey in Texas: Open Source Governance Lags

3 minute read time

Talking Turkey in Texas: Open Source Governance Lags
Read More...

CIO.com: Helping Developers Reduce Open Source Risk

1 minute read time

CIO.com: Helping Developers Reduce Open Source Risk
Read More...

Bash 2014 - This Is Not a Party

2 minute read time

I can honestly say that although referred to by the media as Shellshocked, I am neither shocked nor awed.
Read More...

Skeleton Key

2 minute read time

A skeleton key is capable of opening any lock regardless of make or type. Do you know anyone who has one? I do. Lots of them.
Read More...

Time for Full Open Source Disclosure

4 minute read time

We are not the first industry to face this challenge. But many are convinced our problem is much smaller than it really is or that it does not exist.
Read More...

Part 2: The Internet of Everything: Code, Cars, and More

3 minute read time

In part one of my blog, It's Just the Way Software is Made, I discussed the realities of how software is made, the birth of agile development, and the.
Read More...