Armitage Archive

Highlight from ActiveState_Unrestricted_Upgrades_ Cost_Effective_Technical_Debt_Management

The best example may be downloading prebuilt components from open source repositories despite the fact that: • No details are provided about how the component was built, or from where its source code originated.

• Few organizations have a relationship with the authors of the open source components they use, requiring blind trust. Worse, most components include multiple dependencies, each of whose authors must also be blindly trusted.

• Precompiled binary components are difficult to scan in order to ensure they haven't been compromised.