Threatrix Blog

Enterprise open source security & compliance

Sphere
Blog Background

Results for:

Clear

Category: COMPLIANCE

Clear
Threatrix
The Happiest Day of your Life: You are Being Acquired

Imagine, if you will, you (and your team of developers) have invested the last two years building a fantastic new Software as a Service solution, and you have poured blood, sweat, and tears into the development process.

Where to put your money first for Security tools. SCA, SAST, or DAST?
Where to put your money first for Security tools. SCA, SAST, or DAST?

Having researched the importance of securing your company’s intellectual property, you have started down the road towards what tools work best for securing it. Let’s look at the three most common tools companies should consider purchasing and where best to allocate your cybersecurity funds. The three most popular tools are SCA, SAST, and DAST.

Security and License Compliance Awareness is the Theme of Open Source 2022
Security and License Compliance Awareness is the Theme of Open Source 2022

Open-source software is in all software development, and we’ll see even more growth continue in 2022. Every industry vertical uses and develops open-source software, and all businesses are considered software companies. As a result of the pandemic, more businesses offer their products and services online or through apps.

What Are the Ingredients for an Accurate SBOM?
What Are the Ingredients for an Accurate SBOM?

The Software Bill of Materials (SBOM) has made quite a stir lately. From President Biden’s executive order to further secure our infrastructure to the NHS in Britain, emulating the mandate to improve security and transparency for England’s healthcare system.

Why Software Supply Chain Security is so Important
Why Software Supply Chain Security is so Important

How do you know what is really in your software? Open-source software is present in an overwhelming amount of proprietary codebases and public projects. For the global 2000, the question you should be asking is not “ if you are or aren’t using open source code.”

Four New Licenses Approved by the Open Source Initiative
Four New Licenses Approved by the Open Source Initiative

As the steward of the Open Source Definition, the Open Source Initiative has been designating licenses as “open source” for over 20 years. These licenses are the foundation of the open-source software ecosystem, ensuring that everyone can use, improve, and share software.

Information Security Training Should Be Top Priority
Information Security Training Should Be Top Priority

The pressures of being a CISO are extensive and extend well past concerns of incident response time. There are pressures of maintaining budgets, reporting improved performance to stock-holders, and when the breadth and number of cyberattacks are increasing, the challenges to find qualified prospects to fill a considerable number of unfilled positions.