Blog Adam Murray

Adam Murray

Writes about open source security and risk mitigation.

Key Takeaways from Stack Overflow’s 2019 Developer Survey

Key takeaways from Stack Overflow’s 2019 Developer Survey, including popular programming languages, tools, and industry trends.

Read More

How the Heartbleed Vulnerability Shaped OpenSSL as We Know It

Discover how the Heartbleed vulnerability shaped OpenSSL, leading to investment in open source projects and a shift in community mindset.

Read More

Is One Programming Language More Secure Than The Rest?

Discover which programming language is the most secure. Find out how popular languages measure up in terms of security.

Read More

Top 5 Docker Vulnerabilities You Should Know

Learn about the top 5 Docker vulnerabilities that could put your product at risk. Stay informed and secure your containers with these tips.

Read More

Experience over Best Practices- Interview with CyberArk’s WhiteHat Hacker Len Noe

Interview with CyberArk’s WhiteHat Hacker Len Noe. Learn how hackers switch to become white hat hackers for the public good.

Read More

3 Crucial Tips for Smarter Container Security Scanning

Discover smarter container security scanning & improve your security by signing images, avoiding root access, and vulnerability scans.

Read More

SweetAlert2 — Mend’s Open Source Project of the Month for January 2019

Explore Mend’s SweetAlert2. Learn how this customizable, responsive, and accessible tool can enhance your development process.

Read More

SecOps: How Security and Operation Teams Can Work Better Together

Learn how Security and Operations teams can work better together in the DevSecOps era. Tips for implementing SecOps.

Read More

Top 10 New Open Source Security Vulnerabilities in 2018

Discover the top 10 new open source security vulnerabilities in 2018, including Linux Kernel, Drupal, AngularJS, and more.

Read More

Sometimes A Vulnerability Isn’t So Vulnerable

Discover how sometimes a vulnerability isn’t as big of a threat as you may think. Learn about effective vs ineffective vulnerabilities.

Read More

Who’s been naughty or nice in the Open Source-verse over 2018?

Reflect on the naughty and nice in the Open Source-verse in 2018 with the top vulnerabilities and cool projects.

Read More

The National Vulnerability Database Explained

Learn about the National Vulnerability Database (NVD), the largest database of known vulnerabilities. Find out how it differs from the CVE.

Read More

OWASP Dependency Check: How Does It Work?

Learn how OWASP Dependency-Check helps secure open source components by identifying vulnerabilities. Discover its features, and more.

Read More

5 Female Pioneers of Software Development We’re Grateful For This Thanksgiving

Learn about 5 female pioneers of software development we’re grateful for. From Ada Lovelace to Barbara Liskov.

Read More

3 DevOps Security Challenges and How to Overcome Them

Learn how to overcome 3 DevOps security challenges, and how to integrate security into the DevOps pipeline.

Read More

Creating Your Open Source Policy Template: 3 Points You Don’t Want to Overlook

Learn how to create an effective open source policy template with 3 key points to ensure compliance and enforcement.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!