Threatrix Blog

Enterprise open source security & compliance

Sphere
Blog Background

Results for:

Clear

Category: CYBERSECURITY

Clear
The Solution to Outdated Open Source Components and the Accumulation of Technical Debt
The Solution to Outdated Open Source Components and the Accumulation of Technical Debt

As the ecosystem of open source software continues to expand, it brings opportunities and threats that can pose significant challenges to corporate security infrastructure. One such threat that often gets overshadowed is the technical debt that accumulates from using outdated open source components in software development. Outdated components are a common, invisible menace.

Threatrix
ChatGPT is Changing the Landscape of Software Development

Software development is evolving at a breakneck pace, with developers under increasing pressure to deliver projects faster and more efficiently. As a result, they are turning to tools like StackOverflow, Unity Answers, Github, and AI-based tools like ChatGPT and Github co-pilot to reduce development time and improve efficiency.

Building Stronger Security: Why Build Time Scans are Crucial for Your SCA Tool
Building Stronger Security: Why Build Time Scans are Crucial for Your SCA Tool

Software composition analysis (SCA) tools are becoming increasingly popular for managing the security risks associated with open source software. These tools help identify and mitigate potential vulnerabilities and other security issues in open source components used to build applications. While many SCA tools focus on scanning the final built code, the importance of build-time scans […]

Threatrix
New OpenSSL critical vulnerability Update

On Oct 25, 2022, The OpenSSL project announced a forthcoming release of OpenSSL (version 3.0.7) to address a critical security vulnerability. This release is now live. The last critical vulnerability in OpenSSL was released in 2016. Our security team has today added this vulnerability to the Threatrix vulnerability database.

Where to put your money first for Security tools. SCA, SAST, or DAST?
Where to put your money first for Security tools. SCA, SAST, or DAST?

Having researched the importance of securing your company’s intellectual property, you have started down the road towards what tools work best for securing it. Let’s look at the three most common tools companies should consider purchasing and where best to allocate your cybersecurity funds. The three most popular tools are SCA, SAST, and DAST.

Security and License Compliance Awareness is the Theme of Open Source 2022
Security and License Compliance Awareness is the Theme of Open Source 2022

Open-source software is in all software development, and we’ll see even more growth continue in 2022. Every industry vertical uses and develops open-source software, and all businesses are considered software companies. As a result of the pandemic, more businesses offer their products and services online or through apps.

Threatrix
Measuring Up Software Composition Analysis Tools

The most critical challenge your organization faces when choosing a software composition analysis (SCA) vendor is understanding that some miss up to 60% of the open source, exposing your organization to security and licensing risks. We’re also seeing challenges surrounding the accuracy of the results.