• : preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home5/govzinec/public_html/sites/all/modules/drigg/drigg/helpers.inc on line 613.
  • : preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home5/govzinec/public_html/sites/all/modules/drigg/drigg/helpers.inc on line 613.
  • : preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home5/govzinec/public_html/sites/all/modules/drigg/drigg/helpers.inc on line 613.
  • : preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home5/govzinec/public_html/sites/all/modules/drigg/drigg/helpers.inc on line 613.
  • : preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home5/govzinec/public_html/sites/all/modules/drigg/drigg/helpers.inc on line 613.
  • warning: Parameter 1 to drigg_link() expected to be a reference, value given in /home5/govzinec/public_html/includes/module.inc on line 406.
  • : preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home5/govzinec/public_html/includes/unicode.inc on line 311.
  • : preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home5/govzinec/public_html/includes/unicode.inc on line 311.
  • : preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home5/govzinec/public_html/includes/unicode.inc on line 311.
  • : preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home5/govzinec/public_html/includes/unicode.inc on line 311.
  • : preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home5/govzinec/public_html/includes/unicode.inc on line 311.
2

Responding to new open source vulnerability disclosures

http://feedproxy.google.com

Best practices for quick remediation and response
Responding to New Vulnerability Disclosures

The techniques to find, fix, and prevent vulnerable dependencies are very similar to other quality controls. They revolve around issues in our application, and maintaining quality as the application changes. The last piece in the vulnerable library puzzle is a bit different.

In addition to their known vulnerabilities, the libraries you use also contain unknown vulnerabilities. Every now and then, somebody (typically a library’s authors, its users, or security researchers) will discover and report such a vulnerability. Once a vulnerability is discovered and publicly disclosed, you need to be ready to test your applications for it and fix the findings quickly—before attackers exploit it.Continue reading Responding to new open source vulnerability disclosures.

Read »
Created by nolan 1 week 3 days ago – Made popular 1 week 3 days ago
Category: Technology   Tags:
  • nolan
  • jschmitz

Recent Jobs

 

Stay Connected at GovLoop

Stay connected at Gov Loop

Weekly Top Stories

Enter your email to receive this week's top stories from GovZine.



Submit Blog

Submit a blog for GovZine to automatically import.

Best karma users

  1. jschmitz
  2. govloop
  3. greg
  4. nolan
  5. gtback