software supply

software supply news search results

Developer news items we found relating to software supply

8 results
OverOps-Platform-helps-DevOps-find-misbehaving-code-with-ML

OverOps Platform helps DevOps find misbehaving code with ML


Thursday, August 2, 2018 by

Machine learning meets bug detection with the announcement that OverOps made about the release of their new platform. DevOps teams will soon be armed with net new machine data to effectively evaluate the reliability of software they promote and implement a culture of accountability within their organizations, says OverOps with the release fo their platform. At its core,...


Sonatype-expands-firewall-to-stop-dev-vulnerabilities

Sonatype expands firewall to stop dev vulnerabilities


Friday, March 9, 2018 by

Sonatype has announced that the Nexus Firewall is now available to support the more than 10 million developers currently using the open source version of Nexus Repository. Previously only available to commercial users of Nexus Repository Pro, the newest version of Nexus Firewall gives all Nexus Repo users the ability to automatically stop vulnerable open source componen...


Flexera-issues-warning-about-Cyberattacks

Flexera issues warning about Cyberattacks


Tuesday, October 24, 2017 by

As 143 million Equifax consumers continue to pick up the pieces from stolen Social Security numbers, birth dates, drivers’ licenses, addresses and credit card numbers, Flexera has another warning - expect a long tail of incidents and breaches in the months and years to come.Flexera surveyed over 400 software suppliers, Internet of Things (IoT) manufacturers and in-house...


Docker-for-the-Enterprise-launched-with-a-Certification-Program

Docker for the Enterprise launched with a Certification Program


Friday, March 3, 2017 by

Docker has announced their Enterprise Edition (EE), a new commercial platform for enterprise development and IT ops teams that build, run, and operate business-critical applications in production at scale across the software supply chain. Comprised of a container runtime, with integrated and multi-tenant orchestration, security and management in addition to an ecosystem...


Scanning-JavaScript-for-vulnerabilities:-How-the-impossible-is-now-possible

Scanning JavaScript for vulnerabilities: How the impossible is now possible


Friday, January 13, 2017 by

Javascript is everywhere, and it's awesome! But the world most popular language can be riddled with problems if you aren't a careful programmer.There is a saying that speaks to the incredible popularity of JavaScript as a programming language and it goes like this: “any application that can be written in JavaScript, will eventually be written in JavaScript.” The we...


Docker-predicts-much-opportunity-for-anyone-with-CaaS-expertise-in-2017

Docker predicts much opportunity for anyone with CaaS expertise in 2017


Monday, December 19, 2016 by

Rising confidence in container security, to the point that developers consider containers more secure than alternative technologies, will drive an increase in the use of CaaS, displacing legacy PaaS approaches to application development and deployment. This requirement for integrated security at every phase of the software supply chain will rise to the surface in the up...


Why-software-is-no-longer-being-written-from-scratch

Why software is no longer being written from scratch


Tuesday, November 1, 2016 by

Application developers are increasingly reliant on open source component parts because pre-fabricated components speed up innovation and save developers the time (and money) of having to write code from scratch.But with 6.1% of component downloads containing a known security vulnerability it’s inevitable that defective parts will make their way into production – especia...


Synopsys-Makes-Updates-to-its-Seeker-Runtime-Security-Analysis-Tool

Synopsys Makes Updates to its Seeker Runtime Security Analysis Tool


Monday, August 8, 2016 by

Synopsys has released the latest version of its Seeker runtime security analysis solution. Seeker analyzes web application code and data flows at runtime using a technique known as an Interactive Application Security Testing (IAST), which detects and confirms exploitable security vulnerabilities and provides insight that allows developers to address their root causes. T...