Resources


Webinars

5 Ways to Secure Your Containers for Docker and Beyond

To use containers safely, you need to be aware of potential security issues and the tools you need for securing container-based systems. Secure production use of containers requires an understanding of how attackers might seek to compromise the container, and what you should be aware of to minimize that potential risk.

Tim Mackey, Senior Technical Evangelist at Black Duck Software, provides guidance for developing container security policies and procedures around threats such as:

1. Network security
2. Access control
3. Tamper management and trust
4. Denial of service and SLAs
5. Vulnerabilities

Register today to learn about the biggest security challenges you face when deploying containers, and how you can effectively deal with those threats.

Learn More
Webinars

Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck

Open source powers everything from enterprise and mobile applications to cloud computing, containers and the Internet of Things.

Learn More
Infographics

Compliance in the 2016 Future of Open Source Survey

There is growing opportunity for policies and procedures governing open source use.

Learn More
Infographics

Security in the 2016 Future of Open Source Survey

The development of best-in-class open source security and management practices has not kept pace with growth in adoption.

Learn More
Webinars

Open Source Security Audit Report for Applications

On average the applications contained more than twice as much open source as the organizations thought.

Learn More
Webinars

Strategies for Managing Open Source Security Risk

Insight into the open source used in a code base is critical to managing security risks.

Learn More
Infographics

Open Source Security Analysis 2016 Report

Audits of 200 commercial applications confirm the importance of open source in application development.

Learn More
Whitepapers

Taking Container Security to the Next Level

How security professionals can protect code integrity in containers

Learn More
Webinars

Application Security: 6 Myths of Open Source Management

Move beyond the myths to understand the processes you can implement to reduce risk from security vulnerabilities.

Learn More
Whitepapers

Application Security in 2016

How CISOs can face key application security challenges organizations face in the year ahead.

Learn More
Reports

Open Source Security Analysis

The State of Open Source Security in Commercial Applications

Learn More
Infographics

AppSec – The Changing Attack Surface

Application security attack vectors have grown in scope and reach as open source usage grows.

Learn More