+34 91 515 1390   |    info@panoramait.com

State of the Software Supply Chain 2020

Read Sonatype’s sixth annual report on open source software development and understand why productivity doesn’t have to come at the cost of reduced security.

The State of the Software Supply Chain 2020 Report combines a broad set of public and proprietary data, along with the results of a survey of more than 5,600 professional developers to reveal significant findings, including:

  • 430% growth in next-generation cyberattacks actively targeting OSS (Chapter 1)
  • 1.5 trillion requests to download OSS components (Chapter 2)
  • 530 times faster to update dependencies for exemplary OSS projects (Chapter 3)
  • 26 times faster remediation of vulnerabilities in high-performance equipment (Chapter 4)
  • 11% of OSS components used in applications have known vulnerabilities (Chapter 5)

For the second year in a row, Sonatype has collaborated with research partners Gene Kim of IT Revolution and Dr. Stephen Magill CEO of MuseDev, to examine how high-performance enterprise software development teams successfully balance their performance and risk management practices while assembling applications with open source components.

Source: Sonatype


The essential safety guide

Do you have a cybersecurity plan? Digital technology is touching every aspect of our lives, which is giving bad actors an unlimited runway to create new threats on a daily basis. It is this atmosphere that makes it imperative that organizations are prepared, informed...

read more

5 keys for CISOs to accelerate business.

Now more than ever, chief information security officers (CISOs) are expected to weigh in on business-level decisions. In an increasingly competitive landscape, business acumen has become as important as technical knowledge, and executives rely on the CISO to map...

read more

What most people don’t know about Synthetic Monitoring

Synthetic monitoring enables you to improve the end-user experience by proactively verifying that important transactions can be completed and key endpoints accessed. It simulates a user view of your application and provides high-level performance information that can...

read more