In this profile originally featured at the Generative Ai Digital Summit, Kenny Mullican dives into IBM’s new enterprise-ready data and AI platform watsonx.
Open-Source Software
The updated Endor Labs platform lets cybersecurity users assess open-source software using natural language search.
Kieron Allen explores how business analysts and data scientists benefit from the consolidated SAS Viya platform.
Bill Doerrfeld speaks with Perforce’s open-source evangelist on the benefits of creating a dedicated group to oversee open-source practices within organizations.
Tactical threat intelligence is gathering, analyzing, and sharing data to find cyber threats and figure out how to deal with them. Learn how to set up a program.
With DroidGPT, Endor Labs applies generative AI to software development to ensure open-source packages are current and secure.
In this special “on location” minute, Paul Swider shares his impressions from the third day of the HIMSS 2023 Global Health Conference and Exhibition in Chicago.
The cost of building and maintaining a technology ecosystem can be substantial, but there are ways to be smart about it, writes Janet Schijns.
Small- and medium-sized businesses can stay current on the latest threats and detect and prevent attacks with tailored threat intelligence data by leveraging open-source platforms, tools, and communities.
Databricks has rolled out its own AI model intended as a simpler alternative to ChatGPT, with an aim to help customers build chatbots.
As sustainability becomes a key focus for businesses and critical infrastructure, organizations must also prioritize cybersecurity and secure data standards to safeguard emerging technologies like IoT and OT devices from evolving cyber threats.
“Optimizing your tech environment doesn’t have to break the bank,” says Janet Schijns, who provides tips to save money and stay ahead of the competition.
Endor Labs released a report that identifies the top 10 open source software risks, including known vulnerabilities, compromised legitimate packages, untracked dependencies, and more. Chis Hughes explains.
AI and automation can protect against financial and reputational losses from data theft and ransomware in financial software, writes Bill Doerrfeld.
Chris Hughes reveals alarming findings in the 2023 Open Source security and risk analysis report by Synopsys.
Implementing a multi-cloud architecture across different geographies opens up unique security risks. Bill Doerrfeld recommends concrete measures to protect your business.
Software bills of materials are important because they serve as standardized artifacts in developmental processes, as well as for security and compliance.
The shift to renewable energy leaves oil, gas, and electrical infrastructure vulnerable to threats such as ransomware, DDoS, and more, CISO Chris Hughes explains.
John Siefert, Chris Hughes, Frank Domizio, and Rob Wood explain why applying software composition analysis (SCA) early in the development cycle makes it easier to address security issues when they arise.
The capabilities of Snyk for automatic discovery & remediation have positioned it to shift security left. However, vendor solutions only go so far.