Hi [[ session.user.profile.firstName ]]

Black Duck Software

  • Date
  • Rating
  • Views
  • Contain your risk: Deploy secure containers with trust and confidence Contain your risk: Deploy secure containers with trust and confidence Brent Baude, Principle Software Engineer, Atomic and Docker Development, Red Hat; Randy Kilmon, VP, Engineering, Black Duck Recorded: Sep 22 2016 51 mins
    Organizations are increasingly turning to container environments to meet the demand for faster, more agile software development. But a 2015 study conducted by Forrester Consulting on behalf of Red Hat revealed that 53% of IT operations and development decision makers at global enterprises reported container security concerns as a barrier to adoption.

    The challenges of managing security risk increase in scope and complexity when hundreds or even thousands of different open source software components and licenses are part of your application code base. Since 2014, more than 6,000 new open source security vulnerabilities have been reported, making it essential to have good visibility into and control over the open source in use in order to understand if any known vulnerabilities are present.

    In this webinar, experts from Red Hat and Black Duck will share the latest insights and recommendations for securing the open source in your containers, including protecting them from vulnerabilities like Heartbleed, Shellshock and Venom. You’ll learn:
    • Why container environments present new application security challenges, including those posed by ever-increasing open source use.
    • How to scan applications running in containers to identify open source in use and map known open source security vulnerabilities.
    • Best practices and methodologies for deploying secure containers with trust and confidence.
  • Managing Open Source in Application Security and Software Development Lifecycle Managing Open Source in Application Security and Software Development Lifecycle John Steven, CTO, Cigital; Mike Pittenger, VP Security Strategy, Black Duck Recorded: Sep 15 2016 55 mins
    Today, open source comprises a critical component of software code in the average application, yet most organizations lack the visibility into and control of the open source they’re using. A 2016 analysis of 200 commercial applications showed that 67% contained known open source vulnerabilities. Whether it’s a SaaS solution you deliver to millions of customers, or an internal application developed for employees, addressing the open source visibility and control challenges is vital to ensuring proper software security.
     
    Open source use is ubiquitous worldwide. It powers your mobile phone and your company’s most important cloud application. Securing mission critical applications must evolve to address open source as part of software security, complementing and extending the testing of in-house written code.
     
    In this webinar by Cigital and Black Duck security experts, you’ll learn:
     
    - The current state of application security management within the Software Development Lifecycle (SDLC)
    - New security considerations organizations face in testing applications that combine open source and in-house written software.
    - Steps you can take to automate and manage open source security as part of application development
  • 5 Ways to Secure Your Containers for Docker and Beyond 5 Ways to Secure Your Containers for Docker and Beyond Tim Mackey, Senior Technology Evangelist, Black Duck Software Recorded: Aug 17 2016 44 mins
    To use containers safely, you need to be aware of potential security issues and the tools you need for securing container-based systems. Secure production use of containers requires an understanding of how attackers might seek to compromise the container, and what you should be aware of to minimize that potential risk.

    Tim Mackey, Senior Technical Evangelist at Black Duck Software, provides guidance for developing container security policies and procedures around threats such as:

    1. Network security
    2. Access control
    3. Tamper management and trust
    4. Denial of service and SLAs
    5. Vulnerabilities

    Register today to learn about the biggest security challenges you face when deploying containers, and how you can effectively deal with those threats.
  • Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck Michael Right, Senior Product Manager, HPE Security Fortify; Mike Pittenger, VP of Security Strategy, Black Duck Recorded: Aug 11 2016 42 mins
    Open source software is an integral part of today’s technology ecosystem, powering everything from enterprise and mobile applications to cloud computing, containers and the Internet of Things.
     
    While open source offers attractive economic and productivity benefits for application development, it also presents organizations with significant security challenges. Every year, thousands of new open source security vulnerabilities – such as Heartbleed, Venom and Shellshock – are reported. Unfortunately, many organizations lack visibility into and control of their open source. Addressing this challenge is vital for ensuring security in applications and containers.
     
    Whether you’re building software for customers or for internal use, the majority of the code is likely open source and securing it is no easy task. In this session, you’ll learn about:

    • The evolving DevOps and software security assurance lifecycle in the age of open source
    • The software security considerations CISOs, security, and development teams must address when using open source
    • An automated approach to identifying vulnerabilities and managing software security assurance for custom and open source code.
  • Open Source Security Management with Black Duck Hub: Best Practices Open Source Security Management with Black Duck Hub: Best Practices Pat Durante, Senior Director Education Services; John Beaudoin, Sr. Instructional Designer; Dave Gruber, VP of Products Recorded: Aug 3 2016 58 mins
    Join us for our next customer webinar where we’ll share expert tips and best practices on how to extract maximum value from your Black Duck Hub implementation through automation.
     
    Even before you scan your first line of code, Black Duck Hub brings value to your organization. This includes the ability to define strategies around users and user roles, project and policy management in order to simplify and streamline your organization’s open source security management. You’ll also learn how to integrate Hub and its security features more tightly into your continuous code development and DevOps ecosystem to bring you from a simple, reactive scanning approach to a more mature, automated one for managing open source use across your organization.
     
    You Will Learn
    • How to architect the right user, project, and policy management for maximum impact.
    • Ways to incorporate Hub scanning into your continuous code development and DevOps lifecycle.
    •Leveraging Black Duck Hub integrations with DAST/SAST security testing tools for enhanced application security.
    • Best practices for interpreting your Hub scanning results and establishing a triage policy to deal with open source issues that need remediation.
    • Ways to leverage the built-in and third-party resources to speed up the remediation process.
    • How Black Duck Hub can help you move from a reactive approach to open source management to an automated one.

    Following the demonstration, we’ll leave plenty of time for you to ask our product experts questions. 
  • 2016 Open Source Security Audit Report for Commercial Applications 2016 Open Source Security Audit Report for Commercial Applications Mike Pittenger, VP of Security Strategy, Black Duck Recorded: Jun 23 2016 36 mins
    Recent Black Duck On-Demand security audits of 200 commercial applications confirm the importance of open source in application development, but also highlight the persistent challenges organizations face in effectively securing and managing their open source. Black Duck’s Open Source Security Audit Report reveals that on average the applications contained more than twice as much open source as the organizations thought, and that 67% of the audited applications contained known open source vulnerabilities.
    In this 30-minute webinar, Black Duck VP of Security Strategy Mike Pittenger will review the audit findings and discuss strategies companies can use to minimize security risk while maximizing the economic and productivity value open source provides.
  • Strategies for Managing Open Source Security Risk Strategies for Managing Open Source Security Risk Peter McLaughlin, David A. Wheeler, Karen Copenhaver, Mark Radcliffe Recorded: Jun 22 2016 64 mins
    Open source-savvy lawyers have long advised their clients on managing risk by attending to compliance processes. But, insight into the open source and other third party code used in a code base is also critical to managing security risks.

    Join Phil Odence, Vice President and General Manager at Black Duck Software, as he moderates a panel on the strategies you should have in place to manage the security of open source components in applications and containers.

    DLA Piper security expert Peter McLaughlin will discuss the legal underpinnings of cyber security. David A. Wheeler, security research expert for the Institute for Defense Analyses (IDA) will explore the Linux Foundation's Core Infrastructure Initiative to ensure the security of open source projects.
  • Application Security: 6 Myths of Open Source Management Application Security: 6 Myths of Open Source Management Chester Liu, Black Duck Software Recorded: May 25 2016 37 mins
    The recent high-profile “Panama Papers” exploit, which resulted in the theft of 2.6 terabytes of data from the Mossack Fonseca law firm, highlighted the firm’s failure to effectively secure and manage its open source software.
    Although the exploited component has yet to be pinpointed, the breach investigation has revealed that Mossack Fonseca was delinquent in patching known open source vulnerabilities in both Drupal and Wordpress. This lapse exposed sensitive client information.
    Open source software is an essential element in application development today and this breach raises the question: What are the best practices for securing and managing open source to avoid exploitation? This webcast will detail the processes organization can implement to secure and manage their open source to reduce risk from security vulnerabilities.
  • Empowering Application Security Protection in the World of DevOps Empowering Application Security Protection in the World of DevOps Constantine Grancharov - IBM, Mike Pittenger - Black Duck Software Recorded: May 12 2016 41 mins
    How do organizations build secure applications, given today's rapidly moving and evolving DevOps practices? Whether it’s containers like Docker or the increasing mix of custom and open source code, development teams are aware of the shifting security challenges they face. However, they're not security experts and do not have spare time to learn new tools.

    What can development teams do to keep pace with rapidly evolving application security threats?

    The answer lies in automation. By making application security part of the continuous build processes, organizations can protect against these major risks.

    Join IBM and Black Duck for our latest webinar on best practices for application security in DevOps. You’ll learn:

    • New security challenges facing today’s popular DevOps and Continuous Integration (CI) practices, including managing custom code and open source risks with containers and traditional environments.
    • Best practices for designing and incorporating an automated approach to application security into your existing development environment.
    • Future development and application security challenges organizations will face and what they can do to prepare.
  • PCI and Vulnerability Assessments - What’s Missing? PCI and Vulnerability Assessments - What’s Missing? Mike Pittenger, VP of Security Strategy, Black Duck Recorded: May 4 2016 36 mins
    All regulatory requirements (HIPAA, PCI, etc.) include a mandate for assessing vulnerabilities in systems that manage or store sensitive data. Organizations often opt to conduct vulnerability assessments on an annual, quarterly, or even monthly basis. But while vulnerability assessment tools can identify unpatched or misconfigured code bases, these tools overlook a large portion of an organization’s attack surface: known vulnerabilities in applications that are built in-house. These applications will not have public updates, nor will the thousands of open source components they utilize be included in public disclosures. This is concerning because over 6,000 vulnerabilities in open source projects have been reported since 2014. Register for this webinar to discover how to protect yourself.

Embed in website or blog