
Sign up to save your podcasts
Or


Many organizations spend valuable security resources fixing vulnerabilities in code that never actually runs—an inefficient and often unnecessary effort. Jeff Williams, CTO and founder at Contrast Security, says that 62% of open source libraries included in software are never even loaded into memory, let alone executed. This means only 38% of libraries are typically active and worth prioritizing.
By Anton Shipulin / Listen Notes4.5
88 ratings
Many organizations spend valuable security resources fixing vulnerabilities in code that never actually runs—an inefficient and often unnecessary effort. Jeff Williams, CTO and founder at Contrast Security, says that 62% of open source libraries included in software are never even loaded into memory, let alone executed. This means only 38% of libraries are typically active and worth prioritizing.

229,169 Listeners

4,349 Listeners

373 Listeners

374 Listeners

653 Listeners

1,022 Listeners

112,408 Listeners

8,039 Listeners

181 Listeners

189 Listeners
![Talkin' Bout [Infosec] News by Black Hills Information Security](https://podcast-api-images.s3.amazonaws.com/corona/show/516141/logo_300x300.jpeg)
92 Listeners

138 Listeners

0 Listeners

0 Listeners

7 Listeners