Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

WhiteSource

Below you will find reports with the source of “WhiteSource”

image from A Survival Guide To Using GPL

A Survival Guide To Using GPL

This white paper discusses the principals of the GNU Public License (GPL), the risks of using GPL-licensed code, and how GPL code may be used in proprietary products while minimizing legal compliance issues.

(more available)
Added: October 26, 2018
image from All You Ever Wanted To Know About The Most Common Open Source Licenses...And Never Dared To Ask

All You Ever Wanted To Know About The Most Common Open Source Licenses...And Never Dared To Ask

In this white paper, they will answer the most common questions regarding the various licenses you have probably encountered while using open source components.

(more available)
Added: October 25, 2018
image from 7 Facts Every CISO Needs To Know About Open Source Security

7 Facts Every CISO Needs To Know About Open Source Security

This is an infographic that details things every CISO should know about Open Source Security.

Added: October 24, 2018
image from Your Equifax Brief:Understanding The Key Facts And Lessons Learned

Your Equifax Brief:Understanding The Key Facts And Lessons Learned

This is a nice two page paper dedicated to examining the Equifax breach of 2017.

Added: October 15, 2018
image from The Main Pillars Of The DevOps Toolchain

The Main Pillars Of The DevOps Toolchain

This paper discusses DevOps and the security issues related to DevOps.

Added: October 14, 2018
image from How Software Composition Analysis Could Have Prevented The Equifax Breach

How Software Composition Analysis Could Have Prevented The Equifax Breach

This white paper takes a look at the Equifax breach of 2017 and offers a unique analysis at what could have prevented it.

(more available)
Added: October 13, 2018
image from GDPR Friend Or Foe

GDPR Friend Or Foe

This white paper the explore the GDPR. The consequences of non-compliance, and how an organization can use the GDPR to re-examine and upgrade their security posture.

(more available)
Added: October 12, 2018
© Cyentia Institute 2025
Library updated: July 6, 2025 20:08 UTC (build b1d7be4)