SlideShare a Scribd company logo
Open Source Insight:
NVD's New Look, Struts Vuln Ransomware
& Google Open Source Goodies
By Fred Bals, Senior Content Writer & Editor
NIST redesigned the National Vulnerability
Database with a much-needed, modernized look-
and-feel — including a scrolling list of the latest
scored vulnerabilities and a “visualization” section
designed to provide different ways to look at the
data.
First impression? While some kinks still need to be
worked out (the site loads very slowly), it’s going to
be much easier to find vulnerability and mitigation
information in the NVD than in the past.
This Week’s Key Takeaways
More Open Source News
Other open source security and cybersecurity stories
include:
• Attackers targeted developers on GitHub with Dimnie
• New mutations in attacks targeting Apache Struts2
• Google put its open source in one easy-to-find place
• Safeguard your software with Jenkins plug-ins
• Five ways to keep open source-based apps secure
• Pain and confusion with open source licenses
• Top four software development methodologies
For the past few months, developers who
publish their code on GitHub have been
targeted in an attack campaign that uses a
little-known but potent cyberespionage
malware, reports PCWorld.
Sophisticated Malware Attack
Open Source Developers Targeted in Sophisticated
Malware Attack
Emails crafted to attract the attention of developers had
.gz attachments that contained Word documents with
malicious macro code attached. If allowed to execute, the
macro code executed a PowerShell script that reached out
to a remote server and downloaded a malware program
known as Dimnie.
via SC Magazine UK: F5 Networks' researchers witnessed a
campaign targeting the Apache Struts2 vulnerability pivot on 20
March and start delivering Cerber ransomware to servers. Cerber
ransomware encrypts the files of its victims and charges them
bitcoin to decrypt and regain access to them.
It is apparently popular on Russian Underground forums and
Malwarebytes called it “pretty powerful ransomware written with
attention to detail.” The company touted its “rich customization
options and various tricks to make analysis harder.”
Cerber for Servers: Apache Struts2 Campaign Targets
Servers with Ransomware
Google Presents its Open Source Goodies to the World
via ZDnet: In a blog post, Will Norris, a software engineer at
Google's Open Source Programs Office, wrote: "Free and open-
source software has been part of our technical and organizational
foundation since Google's early beginnings. From servers running
the Linux kernel to an internal culture of being able to patch any
other team's code, open source is part of everything we do. In
return, we've released millions of lines of open-source code, run
programs like Google Summer of Code and Google Code-in, and
sponsor open-source projects and communities through
organizations like Software Freedom Conservancy, the Apache
Software Foundation, and many others."
Google Presents its Open Source Goodies to the World
And now, 18 years after Google was
founded, Google has
launched opensource.google.com. This site
"ties together all of our initiatives with
information on how we use, release, and
support open source."
Jenkins Users Can Shore Up Software Security with
Plugins
In an in-depth InfoWorld article, Fahmida Rashid
looks at how you can safeguard the software you
develop from the start with Jenkins plug-ins and
integrations that automate security testing.
For example, a Black Duck Hub plugin for
Jenkins helps identify known vulnerabilities in
open source components, set up open source
security policies, identify license issues, and detect
modified open source components.
Open source is used in numerous applications in all industries by
organizations of all sizes. The reasons are straightforward: Using
open source lowers development costs, speeds time to market,
and accelerates innovation. More than 80 percent of all
cyberattacks specifically target applications. The combination of
these two facts—applications are the #1 target of cyberattacks and
open source is the foundation of most of today’s application
code—leads to the inevitable conclusion that open-source
vulnerabilities are one of the biggest risks to application security.
5 Ways to Keep Open Source Based Apps Secure
5 Ways to Keep Open Source Based Apps Secure
Black Duck vice president of security
strategy, Mike Pittenger, shares tips
and best practices you can take now
to manage open-source risks in
TechBeacon.
Pain and Confusion with Open Source Licenses
Phil Odence, Black Duck vice president and general manager,
shares his thoughts on Kyle Mitchell’s blog, Open Source
License Business Perception Report.
“[Kyle] rates a list of popular licenses along two dimensions:
Pain - how inconvenient they are to use; and Confusion -
uncertainty in the meaning of their terms. He also includes
some concise ‘Key Points’ about each. And, conveniently, he
provided a link to the text of each license in the SPDX License
List. (Kyle is an active contributor to the SPDX Legal Team.) The
framework provides an interesting way to think about licenses
and as input to developing an open source use
policy or selecting a license for a project.”
Top 4 Software Development Methodologies
In order to manage a project efficiently, the
manager or dev team must choose which
software development method works best for
the project at hand. All of the numerous
software development methodologies that
exist are used for different reasons. Black
Duck intern Tyler Hubbell has done some
research to understand why different
methodologies exist, and which ones are the
most commonly used software development
methodologies.
Subscribe
Stay up to date on open source security and cybersecurity –
subscribe to our blog today.
Open Source Insight:  NVD's New Look, Struts Vuln Ransomware & Google Open Source Goodies

More Related Content

What's hot (20)

PPTX
Continuous security: Bringing agility to the secure development lifecycle
Rogue Wave Software
 
PDF
(In)security in Open Source
Shane Coughlan
 
PDF
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
WhiteSource
 
PDF
Demystifying DevSecOps
Archana Joshi
 
PDF
Open Source Security at Scale- The DevOps Challenge 
WhiteSource
 
PPTX
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Black Duck by Synopsys
 
PDF
How to 2FA-enable Open Source Applications
All Things Open
 
PDF
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
IBMGovernmentCA
 
PDF
2011 NASA Open Source Summit - Brian Stevens
NASA Open Government Initiative
 
PPTX
How to get the best out of DevSecOps - an operations perspective
Colin Domoney
 
PDF
How to automate your DevSecOps successfully
Manuel Pistner
 
PPTX
DevSecOps Days SF at RSA Conference 2018
DevSecOps Days
 
PDF
Zero to Ninety in Securing DevOps
DevSecOps Days
 
PPTX
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
Black Duck by Synopsys
 
PDF
Innocent Vulnerabilities vs. Malicious Backdoors: How to Manage Your Risk
WhiteSource
 
PDF
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
SecureSoftwareDevOn SecureSoftwareDevOn
 
PDF
Getting to Know Security and Devs: Keys to Successful DevSecOps
Franklin Mosley
 
PPTX
Open Source Security
Sander Temme
 
PPTX
7 Reasons Your Applications are Attractive to Adversaries
Derek E. Weeks
 
PDF
Tackling the Container Iceberg:How to approach security when most of your sof...
WhiteSource
 
Continuous security: Bringing agility to the secure development lifecycle
Rogue Wave Software
 
(In)security in Open Source
Shane Coughlan
 
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
WhiteSource
 
Demystifying DevSecOps
Archana Joshi
 
Open Source Security at Scale- The DevOps Challenge 
WhiteSource
 
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Black Duck by Synopsys
 
How to 2FA-enable Open Source Applications
All Things Open
 
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
IBMGovernmentCA
 
2011 NASA Open Source Summit - Brian Stevens
NASA Open Government Initiative
 
How to get the best out of DevSecOps - an operations perspective
Colin Domoney
 
How to automate your DevSecOps successfully
Manuel Pistner
 
DevSecOps Days SF at RSA Conference 2018
DevSecOps Days
 
Zero to Ninety in Securing DevOps
DevSecOps Days
 
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
Black Duck by Synopsys
 
Innocent Vulnerabilities vs. Malicious Backdoors: How to Manage Your Risk
WhiteSource
 
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
SecureSoftwareDevOn SecureSoftwareDevOn
 
Getting to Know Security and Devs: Keys to Successful DevSecOps
Franklin Mosley
 
Open Source Security
Sander Temme
 
7 Reasons Your Applications are Attractive to Adversaries
Derek E. Weeks
 
Tackling the Container Iceberg:How to approach security when most of your sof...
WhiteSource
 

Similar to Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open Source Goodies (20)

PDF
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Black Duck by Synopsys
 
PPTX
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Black Duck by Synopsys
 
PPTX
September 13, 2016: Security in the Age of Open Source:
Black Duck by Synopsys
 
PPTX
Open Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing Scam
Black Duck by Synopsys
 
PPTX
Managing Open Source in Application Security and Software Development Lifecycle
Black Duck by Synopsys
 
PPTX
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Black Duck by Synopsys
 
PPTX
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Black Duck by Synopsys
 
PPTX
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Black Duck by Synopsys
 
PDF
Security in the Age of Open Source
FINOS
 
PPTX
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...
Black Duck by Synopsys
 
PDF
Q1 2016 Open Source Security Report: Glibc and Beyond
Black Duck by Synopsys
 
PPTX
Secure application deployment in the age of continuous delivery
Tim Mackey
 
PPTX
Secure application deployment in the age of continuous delivery
Black Duck by Synopsys
 
PPTX
Security in the Age of Open Source
Black Duck by Synopsys
 
PDF
Open Your Mind: Open Source in Libraries
Nicole Baratta
 
PDF
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Software Integrity Group
 
PDF
Preventing Supply Chain Attacks on Open Source Software
All Things Open
 
PPTX
All You need to Know about Secure Coding with Open Source Software
Javier Perez
 
PDF
Providing Services to our Remote Users: Open Source Solutions
Nicole C. Engard
 
PPTX
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Black Duck by Synopsys
 
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Black Duck by Synopsys
 
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Black Duck by Synopsys
 
September 13, 2016: Security in the Age of Open Source:
Black Duck by Synopsys
 
Open Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing Scam
Black Duck by Synopsys
 
Managing Open Source in Application Security and Software Development Lifecycle
Black Duck by Synopsys
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Black Duck by Synopsys
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Black Duck by Synopsys
 
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Black Duck by Synopsys
 
Security in the Age of Open Source
FINOS
 
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...
Black Duck by Synopsys
 
Q1 2016 Open Source Security Report: Glibc and Beyond
Black Duck by Synopsys
 
Secure application deployment in the age of continuous delivery
Tim Mackey
 
Secure application deployment in the age of continuous delivery
Black Duck by Synopsys
 
Security in the Age of Open Source
Black Duck by Synopsys
 
Open Your Mind: Open Source in Libraries
Nicole Baratta
 
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Software Integrity Group
 
Preventing Supply Chain Attacks on Open Source Software
All Things Open
 
All You need to Know about Secure Coding with Open Source Software
Javier Perez
 
Providing Services to our Remote Users: Open Source Solutions
Nicole C. Engard
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Black Duck by Synopsys
 
Ad

More from Black Duck by Synopsys (20)

PDF
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Black Duck by Synopsys
 
PDF
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
Black Duck by Synopsys
 
PDF
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
Black Duck by Synopsys
 
PDF
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
Black Duck by Synopsys
 
PDF
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
Black Duck by Synopsys
 
PDF
Open-Source- Sicherheits- und Risikoanalyse 2018
Black Duck by Synopsys
 
PDF
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
Black Duck by Synopsys
 
PDF
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
Black Duck by Synopsys
 
PDF
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
Black Duck by Synopsys
 
PDF
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
Black Duck by Synopsys
 
PPT
FLIGHT Amsterdam Presentation - From Protex to Hub
Black Duck by Synopsys
 
PPTX
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Black Duck by Synopsys
 
PPTX
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Black Duck by Synopsys
 
PDF
Open Source Rookies and Community
Black Duck by Synopsys
 
PPTX
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Black Duck by Synopsys
 
PPTX
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Black Duck by Synopsys
 
PPTX
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Black Duck by Synopsys
 
PPTX
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Black Duck by Synopsys
 
PPTX
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Black Duck by Synopsys
 
PDF
20 Billion Reasons for IoT Security
Black Duck by Synopsys
 
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
Black Duck by Synopsys
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
Black Duck by Synopsys
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - From Protex to Hub
Black Duck by Synopsys
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Black Duck by Synopsys
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Black Duck by Synopsys
 
Open Source Rookies and Community
Black Duck by Synopsys
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Black Duck by Synopsys
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Black Duck by Synopsys
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Black Duck by Synopsys
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Black Duck by Synopsys
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Black Duck by Synopsys
 
20 Billion Reasons for IoT Security
Black Duck by Synopsys
 
Ad

Recently uploaded (20)

PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PPTX
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
PDF
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Staying Human in a Machine- Accelerated World
Catalin Jora
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
DOCX
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
PPTX
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
Go Concurrency Real-World Patterns, Pitfalls, and Playground Battles.pdf
Emily Achieng
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PDF
Biography of Daniel Podor.pdf
Daniel Podor
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
IoT-Powered Industrial Transformation – Smart Manufacturing to Connected Heal...
Rejig Digital
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Staying Human in a Machine- Accelerated World
Catalin Jora
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Go Concurrency Real-World Patterns, Pitfalls, and Playground Battles.pdf
Emily Achieng
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
Biography of Daniel Podor.pdf
Daniel Podor
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
IoT-Powered Industrial Transformation – Smart Manufacturing to Connected Heal...
Rejig Digital
 

Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open Source Goodies

  • 1. Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open Source Goodies By Fred Bals, Senior Content Writer & Editor
  • 2. NIST redesigned the National Vulnerability Database with a much-needed, modernized look- and-feel — including a scrolling list of the latest scored vulnerabilities and a “visualization” section designed to provide different ways to look at the data. First impression? While some kinks still need to be worked out (the site loads very slowly), it’s going to be much easier to find vulnerability and mitigation information in the NVD than in the past. This Week’s Key Takeaways
  • 3. More Open Source News Other open source security and cybersecurity stories include: • Attackers targeted developers on GitHub with Dimnie • New mutations in attacks targeting Apache Struts2 • Google put its open source in one easy-to-find place • Safeguard your software with Jenkins plug-ins • Five ways to keep open source-based apps secure • Pain and confusion with open source licenses • Top four software development methodologies
  • 4. For the past few months, developers who publish their code on GitHub have been targeted in an attack campaign that uses a little-known but potent cyberespionage malware, reports PCWorld. Sophisticated Malware Attack
  • 5. Open Source Developers Targeted in Sophisticated Malware Attack Emails crafted to attract the attention of developers had .gz attachments that contained Word documents with malicious macro code attached. If allowed to execute, the macro code executed a PowerShell script that reached out to a remote server and downloaded a malware program known as Dimnie.
  • 6. via SC Magazine UK: F5 Networks' researchers witnessed a campaign targeting the Apache Struts2 vulnerability pivot on 20 March and start delivering Cerber ransomware to servers. Cerber ransomware encrypts the files of its victims and charges them bitcoin to decrypt and regain access to them. It is apparently popular on Russian Underground forums and Malwarebytes called it “pretty powerful ransomware written with attention to detail.” The company touted its “rich customization options and various tricks to make analysis harder.” Cerber for Servers: Apache Struts2 Campaign Targets Servers with Ransomware
  • 7. Google Presents its Open Source Goodies to the World via ZDnet: In a blog post, Will Norris, a software engineer at Google's Open Source Programs Office, wrote: "Free and open- source software has been part of our technical and organizational foundation since Google's early beginnings. From servers running the Linux kernel to an internal culture of being able to patch any other team's code, open source is part of everything we do. In return, we've released millions of lines of open-source code, run programs like Google Summer of Code and Google Code-in, and sponsor open-source projects and communities through organizations like Software Freedom Conservancy, the Apache Software Foundation, and many others."
  • 8. Google Presents its Open Source Goodies to the World And now, 18 years after Google was founded, Google has launched opensource.google.com. This site "ties together all of our initiatives with information on how we use, release, and support open source."
  • 9. Jenkins Users Can Shore Up Software Security with Plugins In an in-depth InfoWorld article, Fahmida Rashid looks at how you can safeguard the software you develop from the start with Jenkins plug-ins and integrations that automate security testing. For example, a Black Duck Hub plugin for Jenkins helps identify known vulnerabilities in open source components, set up open source security policies, identify license issues, and detect modified open source components.
  • 10. Open source is used in numerous applications in all industries by organizations of all sizes. The reasons are straightforward: Using open source lowers development costs, speeds time to market, and accelerates innovation. More than 80 percent of all cyberattacks specifically target applications. The combination of these two facts—applications are the #1 target of cyberattacks and open source is the foundation of most of today’s application code—leads to the inevitable conclusion that open-source vulnerabilities are one of the biggest risks to application security. 5 Ways to Keep Open Source Based Apps Secure
  • 11. 5 Ways to Keep Open Source Based Apps Secure Black Duck vice president of security strategy, Mike Pittenger, shares tips and best practices you can take now to manage open-source risks in TechBeacon.
  • 12. Pain and Confusion with Open Source Licenses Phil Odence, Black Duck vice president and general manager, shares his thoughts on Kyle Mitchell’s blog, Open Source License Business Perception Report. “[Kyle] rates a list of popular licenses along two dimensions: Pain - how inconvenient they are to use; and Confusion - uncertainty in the meaning of their terms. He also includes some concise ‘Key Points’ about each. And, conveniently, he provided a link to the text of each license in the SPDX License List. (Kyle is an active contributor to the SPDX Legal Team.) The framework provides an interesting way to think about licenses and as input to developing an open source use policy or selecting a license for a project.”
  • 13. Top 4 Software Development Methodologies In order to manage a project efficiently, the manager or dev team must choose which software development method works best for the project at hand. All of the numerous software development methodologies that exist are used for different reasons. Black Duck intern Tyler Hubbell has done some research to understand why different methodologies exist, and which ones are the most commonly used software development methodologies.
  • 14. Subscribe Stay up to date on open source security and cybersecurity – subscribe to our blog today.