Nov 5, 2024 | Articles, Podcast
In today’s rapidly evolving cybersecurity landscape, managing vulnerabilities in open-source components has become increasingly complex. While traditional approaches relying solely on CVSS scores have their merits, they may not be sufficient to address the...
Nov 1, 2024 | Articles, Podcast
Just yesterday, I received a LinkedIn message about an interesting job opportunity, complete with a link to the job ad. Before clicking, I took a quick look at the URL to ensure it was legitimate—something we all do in this line of work. The website appeared normal...
Oct 22, 2024 | Articles, Podcast
In the ever-evolving landscape of cybersecurity, vulnerability management remains a critical challenge for organizations. While the Common Vulnerability Scoring System (CVSS) has been a staple for years, a new approach called Stakeholder-Specific Vulnerability...
Oct 8, 2024 | Articles, Podcast
In today’s fast-paced digital world, where software vulnerabilities can spell disaster for businesses, choosing the right Software Composition Analysis (SCA) tool is like finding the perfect ingredient for your secret sauce. It’s not just about ticking...
Sep 24, 2024 | Articles, Podcast
When Organisations Take the Leap In today’s digital age, the journey toward open-source security often begins with a nudge, sometimes a gentle one and other times a forceful push. For B2B businesses, this nudge frequently comes from customer demands, as clients...
Sep 10, 2024 | Articles, Podcast
Most modern applications are assembled from open-source components with developers typically writing less than 15% of the code for their application. As the demand for open-source software grows, there’s also an increase in the number of available open-source...