This is a guest post by Lynx. RunSafe Security and Lynx are partners in securing embedded software platforms. For too long, open source vulnerability management has been treated as a reactive game of whack-a-mole: identify vulnerabilities, patch them, and repeat. This...
Table of Contents: Ensure Your Open Source Software Usage Won’t Make You the Next Cybersecurity Victim Software Vulnerabilities Within Your Supply Chain Finding Potential Software Supply Chain Risks in Code Repositories RunSafe Can Keep Your Supply Chain Secure Open...
In a recent webinar hosted by RunSafe Security, moderator Nick Rea, Customer Engineering Leader at Google Cloud, guides a discussion on changing Linux distributions. Learn how containers and cloud services impact security from panelists with expertise in linux,...
RunSafe Security’s CEO Joe Saunders recently hosted a panel discussion on Monitoring Open-Source Software in SAAS Infrastructure. His panel included innovative business leaders in the software, technology, and security sectors: Jonathan B Fishbeck, Founder and...
This post, by Nick Rea, RunSafe Security’s VP, Market Development, originally appeared on the Oracle Cloud Infrastructure Blog: Managing cybersecurity vulnerabilities for organizations of any size is no small task. For organizations that produce their own code,...
Article originally published on DevPro Journal. The debate surrounding open source code is sure to continue for years to come, and we’ve previously detailed both the high-level pros and cons to utilizing it. But one thing for sure is that the usage of open source is...