Is the Open Source You Use a Security Risk?


Application Security Testing: An Integral Part of DevOps

Most organizations are aware of or using open source or open source software. Even big companies that had been focused on close source in the past have been transitioning to more open coding. Not all open source code is created the same, and thus not all open source software should be treated the same.

Black Duck did an analysis of code in 2017 that found that 97% of the 1,071 applications they reviewed contained open source. Over half of those applications had severe open source vulnerabilities, and over 67% of the total had some sort of vulnerability.

If you are using open source software or considering it, then it is important to understand the potential risks. On June 20th, at 1:00 p.m. ET (10:00 a.m. PT), Lenny Liebmann and Mike Pittenger in a webinar where they discuss open source security and management best practices that you can use t reduce security risks.

For more on this event or to register, you can go to eWeek’s eSeminar registration page Here


*** This is a sponsored event ***


  • There are no comments yet. Be the first to comment!

  • You must have javascript enabled in order to post comments.

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • As all sorts of data becomes available for storage, analysis and retrieval - so called 'Big Data' - there are potentially huge benefits, but equally huge challenges...
  • The agile organization needs knowledge to act on, quickly and effectively. Though many organizations are clamouring for "Big Data", not nearly as many know what to do with it...
  • Cloud-based integration solutions can be confusing. Adding to the confusion are the multiple ways IT departments can deliver such integration...

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.