Dec 3, 2024 | Articles, Podcast
When organizations embark on securing open-source software within their applications, they are often overwhelmed by the number of discovered vulnerabilities. The initial shock of the sheer volume can be paralyzing, especially for companies that are still building out...
Nov 5, 2024 | Articles, Podcast
In today’s rapidly evolving cybersecurity landscape, managing vulnerabilities in open-source components has become increasingly complex. While traditional approaches relying solely on CVSS scores have their merits, they may not be sufficient to address the...
Nov 1, 2024 | Articles, Podcast
Just yesterday, I received a LinkedIn message about an interesting job opportunity, complete with a link to the job ad. Before clicking, I took a quick look at the URL to ensure it was legitimate—something we all do in this line of work. The website appeared normal...
Oct 22, 2024 | Articles, Podcast
In the ever-evolving landscape of cybersecurity, vulnerability management remains a critical challenge for organizations. While the Common Vulnerability Scoring System (CVSS) has been a staple for years, a new approach called Stakeholder-Specific Vulnerability...
Oct 8, 2024 | Articles, Podcast
In today’s fast-paced digital world, where software vulnerabilities can spell disaster for businesses, choosing the right Software Composition Analysis (SCA) tool is like finding the perfect ingredient for your secret sauce. It’s not just about ticking...
Sep 24, 2024 | Articles, Podcast
When Organisations Take the Leap In today’s digital age, the journey toward open-source security often begins with a nudge, sometimes a gentle one and other times a forceful push. For B2B businesses, this nudge frequently comes from customer demands, as clients...