Companies should take extra steps to secure their source code from the type of targeted attacks that hit Google, Adobe, Intel and others over the past few months. That's according to security vendor ...
Wokingham, UK, 29 May 2008 -- Perforce Software has announced that Eden Games, a leading game company, is using the Perforce Software Configuration Management (SCM) system to manage its software ...
Software supply chain security provider Arnica has added new real-time scanning tools to its namesake code-security suite, including static application security testing (SAST), infrastructure as code ...
SolarWinds and Log4j have made software supply chain security issues a topic of intense interest and scrutiny for businesses and governments alike. SolarWinds was a terrifying example of what can go ...
A dispute between a prominent open-source developer and the maker of software used to manage Linux kernel development has forced Linux creator Linus Torvalds to embark on a new software project of his ...
A dispute between a prominent open-source developer and the maker of the software used to manage Linux kernel development has forced Linux creator Linus Torvalds to embark on a new software project of ...
As open source software pushes its way further into the enterprise, a new set of risks has arisen regarding IP (intellectual property). The problem is that developers happily borrow code from various ...
BOSTON (Reuters) - The hackers behind the attacks on Google Inc and dozens of other companies operating in China stole valuable computer source code by breaking into the personal computers of ...
U.S. cybersecurity company F5 disclosed that nation-state hackers breached its systems and stole undisclosed BIG-IP security vulnerabilities and source code. The company states that it first became ...
Cloudflare has revealed its systems were compromised on Thanksgiving last year, leading to source code being accessed by threat actors. The IT service provider believes the attack, which took place on ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results