CybersecurityGuidesTLS and networking20 Min ReadTLS (Transport Layer Security), the compatible successor to SSL (Secure Socket Layer), is the basis of…
CybersecurityGuidesSecurity and cryptography algorithms: A guide13 Min ReadThese algorithms have been extensively studied by cryptographers, and open-source implementations have benefited from the scrutiny…
CybersecurityGuidesEssential Python web security13 Min ReadThis series explores the critical security principles every Python web developer should know. While hard and…
CybersecurityPractical Open SourceSteady in a shifting Open Source world: FreeBSD’s enduring stability5 Min ReadFreeBSD's new release cycle and extended support offer stability and predictability. Here's how to get involved.
CybersecuritySupply ChainClearlyDefined at SAP: enhancing Open Source license compliance through Open Source data3 Min ReadA case study on how ClearlyDefined has become an integral part of SAP's FOSS compliance process,…
CybersecurityNewsHow Open Source instruction set architectures are transforming security3 Min ReadOpen Source hardware security is poised for a transformative revolution, spearheaded by advancements in ISAs.
CybersecuritySupply ChainBalancing speed vs. security in the shadow software supply chain7 Min ReadShadow software supply chains, with unclear licenses and risky code, are almost undetectable from other contributions.
CybersecuritySupply ChainSBOM: A key tool for software supply chain security3 Min ReadGet to know the concepts of software bills of materials (SBOMs) and the basic elements defined…