As with all new Node.js versions, the April 2021 release of Version 16 brought a host of changes to the server-side runtime environment. Node v16 added a new integrated package manager, several developer wish-list features, and support for a new generation of microprocessors. With Node v17’s release in October 2021, Node v16 moves to Long-Term…
Continue ReadingOpen Source Software
How To Use OWASP Top 10 To Secure Your Organization?
Over two decades, the Open Web Application Security Project’s top-10 list has become an essential report card for software security professionals. OWASP compiles its list of authentication vulnerabilities and other issues using Common Weakness Enumeration reports from a worldwide community of developers. Beginning with its 2017 effort, the group augmented the CWE reports with a…
Continue ReadingHow Do I Use BitBucket Security Scanner?
The code management software Bitbucket helps teams collaborate more cohesively to improve the integration of high-quality code. Core features are available to all Bitbucket users, while the choice between cloud, data center, or on-site servers determines a user’s accessibility to several valuable abilities. Bitbucket’s user-friendly interface makes it easy to monitor and track all pull…
Continue ReadingBitbucket Security Best Practices for 2021
It’s challenging to keep up with the best cybersecurity practices, as recommended security measures change quickly and often. Thankfully, Bitbucket offers simple ways to maintain safe code. Although the specifics vary, the following best practices apply to almost any git or repository. 1. Change Keys, Tokens and Passwords Often Security begins at login, so information…
Continue ReadingSupply Chain Attacks – Defend Against Dependency Substitution and Typosquatting
If you’ve referenced open-source software in your software development process, you’ve relied on code published to public repositories as “packages”. These packages can be an attack vector when a malicious character uses Dependency Substitution or Typosquatting to ceate a supply chain attack. Those packages are downloaded and installed by a package manager. Each programming language…
Continue ReadingDocker Vulnerabilities and Security Risks
Since 2013, Docker has enabled rapid development and deployment of web applications. With its innovative approach to containers, Docker also pioneered a way to distribute highly secure applications. Nonetheless, security is never perfect. With even the most popular docker images containing vulnerabilities or malware, a hard look at Docker security issues is a wise move…
Continue ReadingNode.js Versioning
Node.js versioning is an essential skill for developers aiming to rapidly deploy secure web apps. Read about the tools that tame version management.
Continue ReadingWhat Is Bower?
What is Bower, and what are the alternatives to this popular but deprecated package manager? Learn the past and future of client-side dependency management.
Continue ReadingManaging OSS for Mergers and Acquisitions
In today’s software industry, mergers and acquisitions are quite common, even considered a frequent occurrence. Some in the industry have even said they’re “the name of the game” in the software industry. While larger companies often acquire smaller ones, it isn’t at all uncommon for the opposite to occur, so no matter how large or…
Continue ReadingOpen Source Licenses Types and Issues (OSS)
Currently, open source software license (OSS) usage not only represents an ever-growing portion of the software market, but is nearly a necessity of doing business and developing modern software. Utilizing OSS software allows companies to leverage the work of large communities and benefit from the collaboration of those communities’ users to create better software with…
Continue Reading