El uso de soluciones de código abierto crece más de un 33% interanual, también las amenazas y ciberataques inherentes a estas soluciones.
Search Results: open-source software (171)
Bill Doerrfeld speaks with oak9 Co-founder Aakash Shah about ways to reduce known and unknown vulnerabilities brought on by open-source software.
Metaverse development will create unfathomable amounts of data in countless forms. Is immudb the open-source ledger database solution to handle it all?
As Chris Hughes explains, the recent U.S. government response to increased software supply chain attacks will force the cybersecurity industry to innovate.
While there are many aspects of implementing effective application security, a key element is implementing secure software development practices for internal application development activities.
Whereas low-code platforms tend to favor visual programming models, traditional programming involves more hand-coding and customization.
Automation and code generation can greatly accelerate software development, but engineers can’t turn into robots themselves.
The cybersecurity innovator Snyk caters to developers, ensuring that their code is secure as it’s written, and that their open-source software is monitored continuously.
The updated Endor Labs platform lets cybersecurity users assess open-source software using natural language search.
In this Data Revolution Minute, Pablo Moreno compares the Data Science Landscape 2022 results to the 2020 findings. The study focuses on the security aspect of open-source software.
Discover the hidden risks embedded in AI code, including false security assumptions and a pattern of bypassing policies.
NetRise’s AI-driven Trace feature transforms supply chain security, using semantic search and natural language processing to identify risks, offer context-rich insights, and create comprehensive asset graphs.
With its Viya platform, SAS consolidates its offerings into a single, cloud-native product for AI-driven automation, data management, and analytics.
Bill Doerrfeld speaks with Perforce’s open-source evangelist on the benefits of creating a dedicated group to oversee open-source practices within organizations.
The Cloudera Data Platform (CDP) supports data access, analytics, and governance across diverse architectures and sources.
The cost of building and maintaining a technology ecosystem can be substantial, but there are ways to be smart about it, writes Janet Schijns.
As sustainability becomes a key focus for businesses and critical infrastructure, organizations must also prioritize cybersecurity and secure data standards to safeguard emerging technologies like IoT and OT devices from evolving cyber threats.
“Optimizing your tech environment doesn’t have to break the bank,” says Janet Schijns, who provides tips to save money and stay ahead of the competition.
With the advancement of natural language processing (NLP) tools, guardrails and content moderation are critical to combat bias that can creep in.
Implementing a multi-cloud architecture across different geographies opens up unique security risks. Bill Doerrfeld recommends concrete measures to protect your business.