A Hard Lesson in Open Source Vulnerability Management

Sign in to queue


The application layer is quickly becoming the most under-protected attack vector within the enterprise for data security. Within the application layer, open source components with known vulnerabilities are becoming the main target for hackers as all the data is public a minimum effort is needed.

Join us for this short webinar to learn about the difference between detecting and fixing proprietary and open source vulnerabilities and how you can automate your open source security practices.



Download this episode

Download captions

More episodes in this series

Related episodes

The Discussion

Add Your 2 Cents