Open source software (OSS) powers much of the technology we rely on today, speeding the pace of innovation and enabling unprecedented collaboration on new product development. And one of the most important and often overlooked aspects of open source software is knowing what software you can legally use, in which situations, and with what requirements….
Continue ReadingDevelopers
The Importance of Software Security in the FinTech Industry
In the FinTech industry, security and trust are paramount. Financial Technology providers, also known as FinTech companies, have enabled consumers worldwide to bank online, providing digital banking and financial services. Yet as we’ve grown accustomed to doing business online, cybercriminals have also grown accustomed to accessing sensitive information, deploying an increasding number of tactics to…
Continue ReadingThe Importance of Application Security for Businesses Using Payment Processing
Modern businesses use payment processing systems for a variety of reasons, from customer convenience to integration with other software like accounting software, customer databases, and sales platforms. In fact, the payment processing solutions market is on pace to reach over $190 billion by 2030, with thousands of payment processors offering software and services to do…
Continue ReadingApplication Security and Compliance – A Guide for Startups and SMBs
Building and scaling a technology product means constantly prioritizing competing demands. Growing companies have urgent development, product, and sales needs, and meeting those needs is an IT leader’s first responsibility. This often leaves little time and few resources for achieving security and compliance goals. Startups and small businesses rarely prioritize these as a strategic, value-generating…
Continue ReadingAdvanced Governance in SCA
Governance in Software Composition Analysis Governance in SCA solutions is an often overlooked yet extremely powerful feature set that can significantly improve a company’s supply chain security, and legal compliance. Governance or Governance Policies consist of the ability to create rules which restrict open source packages based on certain criteria. The result of running these…
Continue ReadingWhat is Software Composition Analysis?
Software is only as safe as the code used to build it. Today, more than 90% of all new software is built using open source code, which can contain unknown risks and dependencies. Software Composition Analysis is a critical tool in reducing risks with third party packages. SOOS’s Software Composition Analysis (SCA) tools mitigate this…
Continue ReadingSOOS Year in Review
We’ve had an exciting year at SOOS. We want to thank all of our customers for a great 2022, and an even better 2023!
Continue ReadingZAP vs. SOOS: Dynamic Application Security Testing Tool Comparison
OWASP’s ZAP is a free, open-source DAST scanner widely used by security professionals around the world to find web application vulnerabilities. SOOS’s DAST scanning abilities are built on ZAP’s foundations, but with added features that makes automated DAST scanning an affordable and seamless part of your software development cycle. SOOS makes it easy to add DAST to the…
Continue ReadingSOOS Joins The DigitalOcean Wave
DigitalOcean is a cloud computing platform that makes it easy for developers, startups, and SMBs to build and deploy applications at scale. The large tech titans (Amazon, Google, Microsoft) dominate the enterprise market, but DigitalOcean has found its mission and market niche by focusing on the needs of SMBs. DigitalOcean’s platform is known for its simplicity,…
Continue ReadingTop 5 Vulnerabilities in Software Development
Virtually all software development has some security risk, whether it is a result of insufficient testing, ignoring best practices, using open-source code with known vulnerabilities, or any combination of poor techniques. Unfortunately, these flaws persist and show up with increasing frequency in applications and operating systems every day. The goal of software professionals everywhere is…
Continue Reading