• +1.800.374.4353
  • Contact Us
  • Search
  • revenera.de
Revenera
Revenera
  • Search
    • Search
  • Blog
    • Software Installation
    • Software Composition Analysis
    • Software Monetization
  • Install
  • Protect
  • Monetize
  • Resources
  • About Us
  • Revenera.com
    • Homepage
    • Install
    • Protect
    • Monetize
    • Resources
    • About Us
  • Community
  • flexera.com
  • BLOG
  • Software Installation
  • Software Composition Analysis
  • Software Monetization
  • Subscribe
    • Get updates delivered to your inbox:

    • Follow Us:  

Software Composition Analysis – What’s in Your Code?

The True Cost of a Data Breach

The numbers are staggering. In 2016 alone, over four billion records have been breached in 4,149 separate cyber security hacks. But companies often leave the door wide open to hackers. The cost and ef…

October 10, 2017 Revenera

Analysis of the Apache Struts 2 Vulnerability CVE-2017-5638

There are many ways developers incorporate open source code into their proprietary applications. A common way is to include versioned dependencies. Another is to copy and paste open source code into y…

September 20, 2017 Revenera

Equifax Confirms: Unpatched Security Vulnerability in Apache Struts 2 Caused Data Breach

Equifax officials confirmed today that the unpatched web application server vulnerability CVE-2017-5638 in Apache Struts 2 caused the massive data breach. An estimated 143 million people were exposed …

September 15, 2017 Revenera

Apache Struts 2 in the News Again – Equifax Data Breach Affects 143 Million People

Equifax, one of the 3 major credit bureaus in the US, announced last week that they were targets of a data breach that potentially involved private information of 143 million consumers. Hackers might …

September 11, 2017 Revenera

Keep the Industrial IoT Secure: Software Composition Analysis

The recent botnets, involving networked security cameras, shone a light on the vulnerability concerns around Industrial Systems and the Industrial IoT (IIoT). These types of devices have characteristi…

August 3, 2017 Revenera

Webinar: The State of Open Source Software – 2016 Year in Review

With the widespread use and adoption of open source software across industries, the need to have visibility into what is in your code is more important than ever. Do you have an open source usage poli…

January 23, 2017 Revenera

Be an Open Source Trend Setter – Take the Survey

Twenty years ago if asked what percentage of Open Source Software (OSS) is used within software applications, you would have heard none, 5% or maybe even as much as 10%. Fast forward to today and Gart…

January 6, 2017 Revenera

  • «
  • 1
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11

Top 10 Posts

  • What is Software Composition Analysis?
  • Open Source Software Licensing: Not everything is as it seems.
  • Let’s Talk Open Source Trends (A 2020 Early Look)
  • June Newsletter: The Latest Buzz in Software Composition Analysis Professional Services
  • What’s Trending with SBOMs, Developers, and Code Scanning
  • Spring4Shell: Deep breath. Don’t panic. Mitigate.
  • Log4j: Come out, come out wherever you are!
  • Open Source: Trouble because of sudden license changes
  • The story behind colors.js and faker.js
  • The FTC’s warning to companies about the failure to protect against open source vulnerabilities
  • Software supply-chain vulnerabilities: A close look on code
  • What you need to know about the Log4j security vulnerability
  • When is the right time to conduct an open source audit?

Topics

  • Software Installation
  • Software Composition Analysis
  • Software Monetization

Tweets by Revenera

Increase your cyber awareness and tune into part one of the podcast dedicated to providing increased awareness around open source and cyber security. Kendra Morton and Alex Rybak from Revenera will explore how to set up a successful security program.

http://ow.ly/Gffi50Jzwql

Image for the Tweet beginning: Increase your cyber awareness and Twitter feed image.
Reply on Twitter 1542946391634354183 Retweet on Twitter 1542946391634354183 0 Like on Twitter 1542946391634354183 0 Twitter 1542946391634354183

The Washington Post is looking to double down on its investment in its tech publishing arm, Arc XP, with a focus on #softwarelicensing. Software licensing holds the power to maximize revenue opportunities if done right. Read more via @axios

http://ow.ly/FLHh50JKQeZ

Image for the Tweet beginning: The Washington Post is looking Twitter feed image.
Reply on Twitter 1542931392413241346 Retweet on Twitter 1542931392413241346 0 Like on Twitter 1542931392413241346 0 Twitter 1542931392413241346

If you’re a lawyer or general counsel interested in open source compliance and security, this webinar is for you. In the panel discussion, experts will discuss a range of topics related to legal software composition analysis and software auditing space.

http://ow.ly/l7pc50JzwlQ

Image for the Tweet beginning: If you’re a lawyer or Twitter feed image.
Reply on Twitter 1542901672220839936 Retweet on Twitter 1542901672220839936 0 Like on Twitter 1542901672220839936 1 Twitter 1542901672220839936

"Making OKRs work as a leader is a two-way street but it starts with trust." @jboogie shares his thoughts on why trust is the key technique required of leaders when working with OKRs:

https://jeffgothelf.com/blog/okr-leadership-requires-trust/?utm_source=twitter&utm_medium=social

Image for the Tweet beginning: "Making OKRs work as a Twitter feed image.
Reply on Twitter 1542584009972236292 Retweet on Twitter 1542584009972236292 0 Like on Twitter 1542584009972236292 0 Twitter 1542584009972236292

Revenera is happy to announce that it has been awarded the “Great Place To Work Certification” in the UK. The honor was granted by the consultancy, Great Place To Work, a leader in the identification and certification of Best Workplaces.

Read more.

http://ow.ly/xIHi50Jzweo

Image for the Tweet beginning: Revenera is happy to announce Twitter feed image.
Reply on Twitter 1542539196979503105 Retweet on Twitter 1542539196979503105 0 Like on Twitter 1542539196979503105 0 Twitter 1542539196979503105
LOAD MORE...
Search

Archive

Software Composition Analysis Tags

agpl    Apache    Apache Log4j    Apache Struts 2    Bootloader    CISA    color.js    Cybersecurity    faker.js    GitHub    GPL    GRUB2    Healthcare    IoT / Intelligent Devices    Java    Legal counsel    License Management    Linux    Log4j    Log4Shell    MIT License    NIST    node modules    npm    Nvidia    Open Source Audits    Open Source Compliance    Open Source Security    Open Source Software (OSS)    OpenChain    Oracle WebLogic    OSS Licenses    Patching    RCE    Remote Code Execution    SBOM    SCA    SCA Maturity Model    SDLC    shift left    software bill of materials    software dependencies    software developers    software development    software licenses    software supply chain    software vulnerability    Spring4Shell    third-party software    US Government    vulnerabilities    Windows   
About the Software Composition Analysis blog

A resource for developers, legal and security experts using and managing open source software. We encourage your feedback as we discuss trends and insights around open source security and license compliance. What is Software Composition Analysis?

Updates in your inbox

Give us your email and we’ll keep you in the loop

Revenera
  • +1.800.374.4353
  • Contact Us
  • Revenera Community
  • revenera.de
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram

© 2022 Flexera Software. All Rights Reserved.

Install

  • Install
  • Products
  • Services & Training

Protect

  • Protect
  • Business Solutions
  • Products

Monetize

  • Monetize
  • Business Solutions
  • Products

Resources

  • All Resources
  • Blog
  • Case Studies
  • Datasheets
  • Demos & Trials
  • Videos
  • Webinars & Events
  • White Papers & Industry Reports

About Us

  • About Us
  • Leadership
  • Media/Press Center
  • Partners
  • Careers
  • Contact Us
  • Terms and Conditions
  • Privacy Policy
  • Revenera.com Sitemap
© 2022 Flexera Software. All rights reserved.    Terms and Conditions    Privacy Policy