Filter & Search

Are You Using One of the Top 6 Most Vulnerable Open Source Projects?

Discover the top six vulnerable open source projects, including Apache Tomcat and Struts2, and learn why updating these components is crucial.

Read More

Comprehensive Comparison of Continuous Integration Tools

Explore a comprehensive comparison of popular Continuous Integration tools like Jenkins, TeamCity, Bamboo, Travis CI, and Microsoft TFS/VSTS.

Read More

Crowdsourcing and Open Source – Friends or Foes?

Dive into the debate on crowdsourcing and open source. Understand their differences, similarities, and how they both leverage community wisdom

Read More

MISRA and ISO 26262: Compliance Is Key to Security

Discover the importance of compliance with MISRA and ISO 26262 standards for security in the transportation industry.

Read More

An Apache Struts Vulnerability You Really Need to Fix

Discover the latest Apache Struts vulnerability & how it can impact your application security. Learn how to fix it and protect your apps.

Read More

Back To Heartbleed. Three Years Later.

Explore the aftermath of Heartbleed, and the importance of managing open source components for security.

Read More

Top 10 Open Source Software Licenses of 2016 and Key Trends

Explore the top open source software licenses of 2016 and key trends in licensing, including the rise of permissive licenses and more.

Read More

The Hidden Stories Behind the Open Source Logos We All Love

Discover the hidden stories behind your favorite open source logos like Android, Linux, GitHub, and more.

Read More

The Five Founding Fathers of Open Source

Learn about the five founding fathers of open source. From Ken Thompson to Linus Torvalds, discover the pioneers who shaped software freedom.

Read More

The Difference Between Continuous Integration, Deployment and Delivery

Learn the differences between Continuous Integration, Deployment, and Delivery in DevOps. Discover how automation and agile practices fit in.

Read More

Dirty Cow Vulnerability Puts All Linux and Android Distributions at Risk

Learn about the Dirty Cow vulnerability impacting Linux and Android distributions. Find out who’s affected, how to protect yourself.

Read More

Critical MySQL Database Vulnerability Puts Your Data at Risk

Critical MySQL database vulnerability puts your data at risk. Learn about its specifications, and steps for remediation and mitigation.

Read More

4 Software Development Challenges Every Enterprise is Facing

Discover the top 4 software development challenges facing enterprises today, from legacy systems to attracting top talent.

Read More

Top 10 Resources for Exploring the World of Open Source

Discover the top 10 resources for exploring the world of open source, from websites to webinars and more.

Read More

7 Factors Developers Should Consider Before Choosing an Open Source Project

Are you in the know about how your team is checking open source? Do you know the open source components used during a project lifecycle.

Read More

What You Don’t Know About Android Application Security…

Discover the latest in Android application security threats and solutions. Learn how to protect yourself and your users from potential risks.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!