How MongoDB, UiPath, Couchbase, and Cloudflare beat expectations and raised their outlook amid challenging macroeconomic conditions.
Search Results: open-source software (192)
Bill summarizes the main points from Endor’s 2022 State of Dependency Management study to better understand how cybersecurity professionals should respond to OSS vulnerabilities.
Bill Doerrfeld summarizes the key points from Sonatype’s “The State of the Software Supply Chain” report to help IT technology divisions better understand how to address open-source security today.
El uso de soluciones de código abierto crece más de un 33% interanual, también las amenazas y ciberataques inherentes a estas soluciones.
Bill Doerrfeld speaks with oak9 Co-founder Aakash Shah about ways to reduce known and unknown vulnerabilities brought on by open-source software.
Metaverse development will create unfathomable amounts of data in countless forms. Is immudb the open-source ledger database solution to handle it all?
As Chris Hughes explains, the recent U.S. government response to increased software supply chain attacks will force the cybersecurity industry to innovate.
While there are many aspects of implementing effective application security, a key element is implementing secure software development practices for internal application development activities.
Whereas low-code platforms tend to favor visual programming models, traditional programming involves more hand-coding and customization.
Automation and code generation can greatly accelerate software development, but engineers can’t turn into robots themselves.
The cybersecurity innovator Snyk caters to developers, ensuring that their code is secure as it’s written, and that their open-source software is monitored continuously.
The updated Endor Labs platform lets cybersecurity users assess open-source software using natural language search.
In this Data Revolution Minute, Pablo Moreno compares the Data Science Landscape 2022 results to the 2020 findings. The study focuses on the security aspect of open-source software.
Framework places strong emphasis on standards, open-source initiatives to orchestrate complex workflows, processes across diverse systems and agents.
Google’s Project Naptime utilizes AI to enhance vulnerability discovery and management, offering promising advancements in cybersecurity.
A discussion of the new strategic partnership between Google Cloud and Oracle, which brings Oracle databases and applications to Google Cloud.
Discover the hidden risks embedded in AI code, including false security assumptions and a pattern of bypassing policies.
NetRise’s AI-driven Trace feature transforms supply chain security, using semantic search and natural language processing to identify risks, offer context-rich insights, and create comprehensive asset graphs.
With its Viya platform, SAS consolidates its offerings into a single, cloud-native product for AI-driven automation, data management, and analytics.
Bill Doerrfeld speaks with Perforce’s open-source evangelist on the benefits of creating a dedicated group to oversee open-source practices within organizations.

















