Subscribe to Updates

    Get the latest News About Governance News And Other Important.

    What's Hot

    Bridging the Gender Gap: Inspiring Words from the Women Making Waves on Starship | Annie Handrick | | Starship Technologies | March 2023

    March 8, 2023

    AI apps like ChatGPT may finally kill the cover letter

    March 8, 2023

    Snow Crash author Neal Stephenson on the metaverse, making movies, climate fears

    March 6, 2023
    Facebook Twitter Instagram
    Facebook Twitter Instagram
    Corporate Governance News
    Corporate Governance News
    Home»Open source software impacts supply chain security

    Open source software impacts supply chain security

    By December 8, 2022No Comments2 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    A study published by Endor Labs found that nearly 95% of all vulnerabilities are found in transitive dependencies (open source code packages that are indirectly pulled into the project rather than picked by the developer) It has been.

    β€œIn this environment, open source software is the backbone of the critical infrastructure, but even seasoned developers and executives are surprised to learn that 80% of the code in modern applications comes from existing OSS. often,” said co-founder and CEO Varun Badhwar. of Endor Labs. “It’s a huge arena, but it’s been largely overlooked. This first report from Station 9 reveals the depth of the problem in this area and the need for substantial solutions. Open Source Code For reuse to reach its full potential, we need to move security to the top of our priority list.”

    From BusinessWire:

    • The problem isn’t just the widespread use of existing open source code in new applications.it’s just a small sampling Of these software dependencies, they are chosen by the developers actually involved. The rest are “transitive” or indirect dependencies, which are automatically pulled into the codebase.
    • The majority (95%) of all vulnerabilities are found in transitive dependencies in the real world, so developers should assess the true impact of these issues or whether they are reachable is very difficult.
    • 50% of the most used Census II packages were not released in 2022 and 30% had a recent release before 2018. These can cause serious security and operational problems in the future.
    • If you upgrade to the latest version of a package, you have a 32% chance of having a known vulnerability.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Leave A Reply Cancel Reply

    Demo
    Our Picks
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss

    Bridging the Gender Gap: Inspiring Words from the Women Making Waves on Starship | Annie Handrick | | Starship Technologies | March 2023

    March 8, 2023

    Author: Lys VerthalIn honor of International Women’s Day today, we’ve compiled a list of powerful…

    AI apps like ChatGPT may finally kill the cover letter

    March 8, 2023

    Snow Crash author Neal Stephenson on the metaverse, making movies, climate fears

    March 6, 2023

    A new era of tech coverage at Vox

    March 6, 2023

    Subscribe to Updates

    Get the latest News About Governance News And Other Important Things.

    About Us
    About Us

    This website provides information about Audit News and other things. Keep Supporting Us With the Latest News and we Will Provide the Best Of Our To Makes You Updated All Around The World News.

    Our Picks

    Subscribe to Updates

    Get the latest News About Governance News And Other Important.

    Corporate Governance News
    Facebook Twitter Instagram Pinterest
    © 2023 corporategovernancenews. Designed by corporategovernancenews.

    Type above and press Enter to search. Press Esc to cancel.