Featured

DevSecOps Community Survey

DevSecOps Community Survey

Sonatype's 5th annual DevSecOps Community Survey of 2,076 IT professionals shares practitioner perspectives on evolving DevSecOps practices, shifting investments, and changing perceptions.

 

Based on responses from 2,076 participants, findings show that while open source breaches are increasing, developers are also thinking about security more.

DOWNLOAD

View the common set of tools peers use: Sonatype Nexus, Sonatype Nexus Lifecycle, HP Fortify, SonarQube, Jenkins, Twistlock, JIRA, Contrast, aqua, OWASP Zap, Find Bugs, Gaunltl, OWASP Depedency check, NESSUS, ThreadFix.

DOWNLOAD

Read this Gartner research paper to learn why information security must adapt to development processes and tools, not the other way around.

DOWNLOAD

Legacy open source governance tools are prone to excessive false positives and create friction within the development lifecycle. Modern open source governance tools are powered by precise and accurate component intelligence and accelerate innovation. Read this paper to learn more.

DOWNLOAD

Read this whitepaper to learn why Gartner believes it's important to re-evaluate the SDLC in the form of a trusted software supply chain, with varied levels of trust.

DOWNLOAD

The 2017 State of the Software Supply Chain Report blends a broad set of public and proprietary data with expert research and analysis to reveal 1. an ever expanding supply and demand for open source components, 2. how open source components of varying quality are fowing through development lifecycles and landing in production applications, and 3. how DevOps-native development teams are leveraging trusted software supply chains to improve quality, security, and productivity.

DOWNLOAD

Forrester describes how application delivery organizations are applying automated supply chain management practices to improve both application delivery governance and business results.

DOWNLOAD

Software developers use open source and third party components to be more competitive and speed time to innovation. Because of this, open source usage is massive and it’s growing. However not all open source components are created equal. Read how you can use the Nexus platform to accelerate DevOps without sacrificing software quality.

DOWNLOAD

Six researchers from Northeastern University offer a comprehensive study of JavaScript library usage and the resulting security implications.  Analysis of 133,000 websites, reveals  37% of them include at least one library with a known vulnerability.

DOWNLOAD

Traditional waterfall-native security practices often don’t fit in the DevOps native world. This survey gives a better sense of how organizations are adapting, what challenges they’ve overcome, and what approaches they are prioritizing.

DOWNLOAD

No single tool can deliver on the promise of DevOps. Instead it’s a collection of tools, easily integrated, tightly managed, and effectively automated. Learn how Nexus integrates with more DevOps tools you use everyday.

DOWNLOAD

Learn how Federal agencies can employ software supply chain automation to closely align with each step of their Risk Managment Framework practice.

DOWNLOAD

Agencies need security protocols that can keep pace with development practices - without holding them back. Discover how SSCA can help agencies achieve greater agility through DevOps while ensuring the code they're using is free of vulnerabilities.

DOWNLOAD

Get your essential go-to-guides for both Nexus and Maven. Learn how to organize, store, and distribute components across your software supply chain using Nexus Repository. Get real practice with Maven using both the reference and example guides detailing key concepts for customizing and optimizing Maven.

DOWNLOAD

We have assembled 40 real-world DevOps and Continuous Delivery reference architectures from our user community.  Each of them offers insight to the user's organizational structure, tools chain, and DevOps processes. Constant themes across the tool chain reveal use of: Jenkins, Sonatype Nexus, Git, Docker, Puppet/Chef, ServiceNow, and Sonar.

DOWNLOAD

Third party software is the new perimeter for every financial institution. According to Gartner, “since enterprises are getting better at defending perimeters, attackers are targeting IT supply chains. Read the guidelines published by FS-ISAC to manage risk associated with open source libraries and components.

DOWNLOAD