{"id":5311,"date":"2020-07-30T07:29:54","date_gmt":"2020-07-30T04:29:54","guid":{"rendered":"https:\/\/www.almtoolbox.com\/blog_he\/?p=5311"},"modified":"2020-08-13T08:49:04","modified_gmt":"2020-08-13T05:49:04","slug":"fossa-open-source-security-vulnerabilities-enterprise","status":"publish","type":"post","link":"https:\/\/www.almtoolbox.com\/blog_he\/fossa-open-source-security-vulnerabilities-enterprise\/","title":{"rendered":"\u05d5\u05d5\u05d1\u05d9\u05e0\u05e8: \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05d0\u05d1\u05d8\u05d7\u05d4 \u05d1\u05e7\u05d5\u05d3 \u05e4\u05ea\u05d5\u05d7 \u05d1\u05e1\u05d1\u05d9\u05d1\u05d5\u05ea Enterprise"},"content":{"rendered":"<p>\u05d9\u05d5\u05ea\u05e8 \u05d5\u05d9\u05d5\u05ea\u05e8 \u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05de\u05d1\u05d9\u05e0\u05d9\u05dd \u05d0\u05ea \u05d4\u05d9\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05e9\u05dc \u05e7\u05d5\u05d3 \u05e4\u05ea\u05d5\u05d7 &#8211; \u05de\u05d4 \u05e9\u05ea\u05d5\u05e8\u05dd \u05dc\u05db\u05da \u05e9\u05d9\u05d5\u05ea\u05e8 \u05d5\u05d9\u05d5\u05ea\u05e8 \u05de\u05d4\u05dd \u05de\u05e9\u05ea\u05de\u05e9\u05d9\u05dd \u05d1\u05e7\u05d5\u05d3 \u05e4\u05ea\u05d5\u05d7 (\u05d5\u05e1\u05e4\u05e8\u05d9\u05d5\u05ea \u05e7\u05d5\u05d3 \u05e4\u05ea\u05d5\u05d7) \u05db\u05d7\u05dc\u05e7 \u05de\u05e4\u05d9\u05ea\u05d5\u05d7 \u05d4\u05ea\u05d5\u05db\u05e0\u05d4 \u05e9\u05dc\u05d4\u05dd. \u05d0\u05d1\u05dc \u05d9\u05d7\u05d3 \u05e2\u05dd \u05d4\u05d9\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05d6\u05d4 \u05de\u05d1\u05d9\u05d0 \u05d2\u05dd \u05d0\u05ea\u05d2\u05e8\u05d9\u05dd &#8211; \u05d5\u05db\u05db\u05dc \u05e9\u05de\u05e9\u05ea\u05de\u05e9\u05d9\u05dd \u05d9\u05d5\u05ea\u05e8 \u05d5\u05d9\u05d5\u05ea\u05e8 \u05d1\u05e7\u05d5\u05d3 \u05e4\u05ea\u05d5\u05d7, \u05d7\u05e9\u05d5\u05d1 \u05dc\u05d4\u05d1\u05d9\u05df \u05d0\u05ea \u05d4\u05de\u05e9\u05de\u05e2\u05d5\u05ea \u05e9\u05dc \u05db\u05da \u05d5\u05dc\u05d8\u05e4\u05dc \u05d1\u05db\u05da.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5313\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2020\/08\/fossa-webinar1.jpg\" alt=\"fossa open source vulnerabilities \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05e7\u05d5\u05d3 \u05e4\u05ea\u05d5\u05d7 \u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea\" width=\"700\" height=\"361\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2020\/08\/fossa-webinar1.jpg 1435w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2020\/08\/fossa-webinar1-300x154.jpg 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2020\/08\/fossa-webinar1-1024x527.jpg 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2020\/08\/fossa-webinar1-768x396.jpg 768w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/p>\n<p>\u05d1\u05d5\u05d5\u05d1\u05d9\u05e0\u05e8 \u05d4\u05d1\u05d0 \u05de\u05d3\u05d1\u05e8 Xing Ding, \u05de\u05e0\u05d4\u05dc \u05de\u05d5\u05e6\u05e8 \u05d1\u05d7\u05d1\u05e8\u05ea FOSSA (\u05d0\u05d5\u05ea\u05d4 \u05d0\u05e0\u05d5 \u05de\u05d9\u05d9\u05e6\u05d2\u05d9\u05dd \u05d1\u05d9\u05e9\u05e8\u05d0\u05dc \u05d5\u05d1\u05d7\u05d5&quot;\u05dc), \u05d5\u05d4\u05d5\u05d0 \u05de\u05e9\u05ea\u05e3 \u05d1\u05ea\u05d5\u05d1\u05e0\u05d5\u05ea \u05dc\u05d2\u05d1\u05d9 \u05d4\u05d0\u05ea\u05d2\u05e8\u05d9\u05dd \u05d4\u05e0&quot;\u05dc, \u05d5\u05db\u05d9\u05e6\u05d3 \u05db\u05d9\u05d5\u05dd \u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05e6\u05e8\u05d9\u05db\u05d9\u05dd \u05dc\u05d8\u05e4\u05dc \u05e0\u05db\u05d5\u05df \u05d1\u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05e7\u05d5\u05d3 \u05d4\u05e4\u05ea\u05d5\u05d7 \u05d5\u05db\u05d7\u05dc\u05e7 \u05de\u05ea\u05d4\u05dc\u05d9\u05db\u05d9 \u05d4\u05e4\u05d9\u05ea\u05d5\u05d7 \u05e9\u05dc\u05d4\u05dd<\/p>\n<h3>\u05d4\u05e0\u05d5\u05e9\u05d0\u05d9\u05dd \u05e2\u05dc\u05d9\u05d4\u05dd \u05d4\u05d5\u05d0 \u05de\u05d3\u05d1\u05e8:<\/h3>\n<ul>\n<li dir=\"ltr\" style=\"direction: ltr; text-align: left;\">Open source in Enterprise IT environments<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Open source vulnerabilities and examples of high profile vulnerabilities<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">How Open source vulnerabilities affect your business<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Best practices to secure your Open source libraries<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Things to consider when evaluating a Vulnerability tool<\/li>\n<\/ul>\n<h3>\u05dc\u05e6\u05e4\u05d9\u05d4 \u05d4\u05e9\u05d0\u05d9\u05e8\u05d5 \u05e4\u05e8\u05d8\u05d9\u05dd \u05d5\u05ea\u05e7\u05d1\u05dc\u05d5 \u05dc\u05d9\u05e0\u05e7 \u05d1\u05de\u05d9\u05d9\u05dc \u05d7\u05d5\u05d6\u05e8:<\/h3>\n\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f5320-o1\" lang=\"he-IL\" dir=\"rtl\" data-wpcf7-id=\"5320\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/blog_he\/wp-json\/wp\/v2\/posts\/5311#wpcf7-f5320-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"5320\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.4\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"he_IL\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f5320-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<div class=\"gitlab-form\">\n\t<p>* \u05e9\u05dd \u05e4\u05e8\u05d8\u05d9 \u05d5\u05de\u05e9\u05e4\u05d7\u05d4:\n\t<\/p>\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span>\n\t<\/p>\n\t<p>* \u05d0\u05d9\u05de\u05d9\u05d9\u05dc:\n\t<\/p>\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"\u05e0\u05d0 \u05dc\u05e6\u05d9\u05d9\u05df \u05de\u05d9\u05d9\u05dc \u05d0\u05e8\u05d2\u05d5\u05e0\u05d9 (\u05d7\u05d1\u05e8\u05d4) \u05d1\u05dc\u05d1\u05d3\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span>\n\t<\/p>\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"referer-page\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text referer-page\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"referer-page\" \/><\/span>\n\t<\/p>\n\t<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner button button-large\" type=\"submit\" value=\"\u05d0\u05e9\u05de\u05d7 \u05dc\u05e6\u05e4\u05d5\u05ea \u05d1\u05d4\u05e7\u05dc\u05d8\u05d4\" \/>\n\t<\/p>\n<\/div><div class=\"wpcf7-form-control-wrap maspik-field\">\n                <label for=\"full-name-maspik-hp\" class=\"wpcf7-form-control-label\">Leave this field empty<\/label>\n                <input size=\"1\" type=\"text\" autocomplete=\"off\" aria-hidden=\"true\" tabindex=\"-1\" name=\"full-name-maspik-hp\" id=\"full-name-maspik-hp\" class=\"wpcf7-form-control wpcf7-text\" placeholder=\"Leave this field empty\">\n            <\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n\n<div class=\"alm-box alm-contact\">\n<div dir=\"rtl\">\u05d0\u05e0\u05d5 \u05de\u05d9\u05d9\u05e6\u05d2\u05d9\u05dd \u05d0\u05ea \u05d7\u05d1\u05e8\u05ea Fossa \u05d1\u05d9\u05e9\u05e8\u05d0\u05dc \u05d5\u05d1\u05d7\u05d5&quot;\u05dc, \u05d5\u05de\u05e6\u05d9\u05e2\u05d9\u05dd \u05d9\u05e2\u05d5\u05e5 \u05d1\u05d0\u05d1\u05d8\u05d7\u05ea \u05e7\u05d5\u05d3 \u05e4\u05ea\u05d5\u05d7, \u05d4\u05d8\u05de\u05e2\u05ea \u05d4\u05db\u05dc\u05d9 \u05db\u05d7\u05dc\u05e7 \u05de\u05ea\u05d4\u05dc\u05d9\u05db\u05d9 \u05e4\u05d9\u05ea\u05d5\u05d7 \u05d5\u05d1\u05d3\u05d9\u05e7\u05d5\u05ea, \u05d4\u05db\u05e0\u05e1\u05ea\u05d5 \u05dc- CI\/CD pipelines, \u05ea\u05de\u05d9\u05db\u05d4, \u05de\u05db\u05d9\u05e8\u05ea \u05e8\u05e9\u05d9\u05d5\u05e0\u05d5\u05ea Business \/ Enterprise \u05d5\u05e2\u05d5\u05d3.<br \/>\n\u05dc\u05e9\u05d0\u05dc\u05d5\u05ea: <a href=\"mailto:fossa@almtoolbox.com\" target=\"_blank\" rel=\"noopener noreferrer\">fossa@almtoolbox.com<\/a> \u05d0\u05d5 \u05d8\u05dc\u05e4\u05d5\u05e0\u05d9\u05ea 072-240-5222<\/div>\n<\/div>\n<h3>\u05e7\u05d9\u05e9\u05d5\u05e8\u05d9\u05dd \u05e8\u05dc\u05d1\u05e0\u05d8\u05d9\u05dd:<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/our-dev-ops-offering-self-hosted\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u05de\u05d4 \u05d7\u05d3\u05e9 \u05d1\u05d4\u05d9\u05e6\u05e2 \u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05db\u05dc\u05d9 \u05d4\u05e4\u05d9\u05ea\u05d5\u05d7 \u05e9\u05dc\u05e0\u05d5 \u05dc\u05e8\u05e9\u05ea\u05d5\u05ea \u05e1\u05d2\u05d5\u05e8\u05d5\u05ea<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u05d9\u05d5\u05ea\u05e8 \u05d5\u05d9\u05d5\u05ea\u05e8 \u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05de\u05d1\u05d9\u05e0\u05d9\u05dd \u05d0\u05ea \u05d4\u05d9\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05e9\u05dc \u05e7\u05d5\u05d3 \u05e4\u05ea\u05d5\u05d7 &#8211; \u05de\u05d4 \u05e9\u05ea\u05d5\u05e8\u05dd \u05dc\u05db\u05da \u05e9\u05d9\u05d5\u05ea\u05e8 \u05d5\u05d9\u05d5\u05ea\u05e8 \u05de\u05d4\u05dd \u05de\u05e9\u05ea\u05de\u05e9\u05d9\u05dd \u05d1\u05e7\u05d5\u05d3 \u05e4\u05ea\u05d5\u05d7 (\u05d5\u05e1\u05e4\u05e8\u05d9\u05d5\u05ea \u05e7\u05d5\u05d3 \u05e4\u05ea\u05d5\u05d7) \u05db\u05d7\u05dc\u05e7 \u05de\u05e4\u05d9\u05ea\u05d5\u05d7 \u05d4\u05ea\u05d5\u05db\u05e0\u05d4 \u05e9\u05dc\u05d4\u05dd. \u05d0\u05d1\u05dc \u05d9\u05d7\u05d3 \u05e2\u05dd \u05d4\u05d9\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05d6\u05d4 \u05de\u05d1\u05d9\u05d0 \u05d2\u05dd \u05d0\u05ea\u05d2\u05e8\u05d9\u05dd &#8211; \u05d5\u05db\u05db\u05dc \u05e9\u05de\u05e9\u05ea\u05de\u05e9\u05d9\u05dd \u05d9\u05d5\u05ea\u05e8 \u05d5\u05d9\u05d5\u05ea\u05e8 \u05d1\u05e7\u05d5\u05d3 \u05e4\u05ea\u05d5\u05d7, \u05d7\u05e9\u05d5\u05d1 \u05dc\u05d4\u05d1\u05d9\u05df \u05d0\u05ea \u05d4\u05de\u05e9\u05de\u05e2\u05d5\u05ea \u05e9\u05dc \u05db\u05da \u05d5\u05dc\u05d8\u05e4\u05dc \u05d1\u05db\u05da. \u05d1\u05d5\u05d5\u05d1\u05d9\u05e0\u05e8 \u05d4\u05d1\u05d0 \u05de\u05d3\u05d1\u05e8 Xing Ding, \u05de\u05e0\u05d4\u05dc [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":5313,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60,189,39,248],"tags":[463,464,162,462],"class_list":["post-5311","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-devops","category-devsecops","category-webinars","category-248","tag-463","tag-464","tag-162","tag-462"],"_links":{"self":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/5311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/comments?post=5311"}],"version-history":[{"count":0,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/5311\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media\/5313"}],"wp:attachment":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media?parent=5311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/categories?post=5311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/tags?post=5311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}