Telecom Cloud and its Open Source Risks
Thursday, 09 March 2023
by Traced
According to federal cyber authorities, some new and emerging technologies that are taking over the telecoms space are presenting inherent security risks to users and providers. These open-source options provide companies with simpler tools whilst using vulnerable code that can leave spaces for third parties and hackers to breach systems. Open source interfaces and components
- Published in Open Source Security
Avoid Surprises: Don’t Let Open Source Issues Impact a Transaction
Friday, 17 February 2023
by Traced
Open source software (OSS) is becoming increasingly popular and widely used by companies of all sizes, but a challenge for businesses. One of the biggest challenges is ensuring the software is used in compliance with the licenses of each component. This is particularly important for companies involved in mergers and acquisitions, as they need to
- Published in Open Source Security
Software Security Checkpoints in the SDLC
Thursday, 29 December 2022
by Traced
How Widespread Are Software Security Checkpoints in the SDLC? According to the 13th and latest edition of the annual Synopsys Building Security In Maturity Model (BSIMM) report, 90% of the member organisations surveyed have established software security checkpoints in their software development lifecycle (SDLC), suggesting this is an important step in their software security initiatives.
- Published in Open Source Security
Why it’s important to not ignore Log4j
Thursday, 15 December 2022
by Traced
Open-source software is becoming more popular, which is beneficial for many reasons, but with this comes an inevitable rise in the number of open-source vulnerabilities and misconceptions. In this blog, we will explore why you shouldn’t ignore Log4j or leave high-severity vulnerabilities in application codes. Vulnerability analysis A recent statistic claimed that “96% of Log4j
- Published in Insight, Open Source Risk, Open Source Security
Tagged under:
open source software
Know your ingredients! How SBOMs protect code
Thursday, 24 November 2022
by Traced
What is an SBOM? When making a good meal or buying food in the supermarket, we always pay attention to the ingredients used. You wouldn’t use meat of unknown origin in your chilli or make an omelette with eggs if you thought they might be out of date. If your friend is allergic to peanuts,
- Published in Insight, Open Source Security, SBOMs, Software Supply Chain
Tagged under:
open source software