{"id":15217,"date":"2021-02-15T18:40:21","date_gmt":"2021-02-15T13:10:21","guid":{"rendered":"https:\/\/coforge.site\/cigniti\/blog\/?p=15217"},"modified":"2021-02-15T18:40:21","modified_gmt":"2021-02-15T13:10:21","slug":"opensource-risk-engineers-empowered","status":"publish","type":"post","link":"https:\/\/coforge.site\/cigniti\/blog\/opensource-risk-engineers-empowered\/","title":{"rendered":"Manage Open Source Risk but keep Engineers Empowered"},"content":{"rendered":"<p><span data-contrast=\"auto\">One of the major challenges faced by d<\/span><span data-contrast=\"auto\">evelopers<\/span><span data-contrast=\"auto\">\u00a0is to create a unique, customized, and compelling customer\u00a0<\/span><span data-contrast=\"auto\">experience<\/span><span data-contrast=\"auto\">\u00a0quickly.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">As a result, they no longer write all their own code to solve every problem.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Instead, they assemble, configure, and automate their code and often rely on common open source<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">components to quickly add application functionality.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">One recent study showed a 21% year-over-year<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">increase in the average number of open source components across the study\u2019s evaluated codebase.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">However, these same critical open source components continue to present a risk to businesses.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">The State of Open Source Consumption<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">According to the latest report written by\u00a0<\/span><b><i><span data-contrast=\"auto\">Gordon\u00a0<\/span><\/i><\/b><b><i><span data-contrast=\"auto\">Haff<\/span><\/i><\/b><span data-contrast=\"auto\">, a technology evangelist at\u00a0<\/span><b><i><span data-contrast=\"auto\">Red Hat<\/span><\/i><\/b><span data-contrast=\"auto\">, on the State of enterprise open source,\u00a0<\/span><span data-contrast=\"auto\">\u201c<\/span><b><i><span data-contrast=\"auto\">95% of respondents say open source is strategically important<\/span><\/i><\/b><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u201d<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The survey of 950 IT leaders was commissioned by\u00a0<\/span><b><i><span data-contrast=\"auto\">Red Hat<\/span><\/i><\/b><span data-contrast=\"auto\">\u00a0to better understand the unique role of enterprise open source. Interestingly, the respondents are unaware that\u00a0<\/span><b><i><span data-contrast=\"auto\">Red Hat<\/span><\/i><\/b><span data-contrast=\"auto\">\u00a0was the sponsor of this research.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As part of this survey,\u00a0<\/span><span data-contrast=\"auto\">\u201c<\/span><b><i><span data-contrast=\"auto\">77% of respondents agree enterprise open source will continue to grow. They believe that the growth of open source software will come at the expense of proprietary software. Respondents cite security and cloud management tools as top uses of enterprise open source<\/span><\/i><\/b><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The benefits they believe to attain from enterprise open source are \u2013\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Higher Quality Software<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Lower total cost of ownership<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Better security<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Designed to work in cloud, cloud-native tech<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Ability to safely leverage open source tech<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">The report further adds,\u00a0<\/span><span data-contrast=\"auto\">\u201c<\/span><b><i><span data-contrast=\"auto\">63% of IT leaders have a hybrid cloud infrastructure today. Among those who don\u2019t, 54% plan to have one within the next 24 months<\/span><\/i><\/b><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><b><i><span data-contrast=\"auto\">And 83% of IT leaders say enterprise open source has been instrumental in their organization\u2019s ability to take advantage of cloud architectures<\/span><\/i><\/b><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The common perception is that hybrid cloud architectures and enterprise open source will enable digital transformation.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">The Risk involved with Open Source<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Open Source Security refers to the risks developers and security teams are facing today when running third-party, open source code in their applications, and the processes, methodologies, and tools they are deploying\u00a0<\/span><span data-contrast=\"auto\">to<\/span><span data-contrast=\"auto\">\u00a0mitigate them.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Recent attacks exploiting vulnerabilities in open source code have exacted huge costs from\u00a0<\/span><span data-contrast=\"auto\">enterprises<\/span><span data-contrast=\"auto\">, highlighting the criticality of Open Source Security and the need to execute and monitor related security strategies.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Open source risk is growing<\/span><span data-contrast=\"auto\">\u00a0exponentially<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Senior Infosec Architects need a 360-degree view of application security issues across the custom code and open source components before it is pushed through to the QA team.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"11\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">80% of application code comes from open source libraries<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"11\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">62% of organizations do not have any control over what components are used in their applications<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"11\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">31% of organizations experienced a breach related to vulnerable open-source components<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Open source is powering the digital transformation we are witnessing today and is used by companies of all sizes,\u00a0<\/span><span data-contrast=\"auto\">across<\/span><span data-contrast=\"auto\">\u00a0all industry verticals. Yet it also comes with risks.\u00a0<\/span><span data-contrast=\"auto\">Developers are pulling in vast amounts of open source dependencies without any security control or visibility.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Acknowledging these risks is an important first step but should be followed up with investment and maintenance of a well-articulated Open Source Security plan that includes\u00a0<\/span><a href=\"https:\/\/www.cigniti.com\/services\/security-testing\/?utm_source=blog&amp;utm_medium=hyperlink&amp;utm_campaign=SecurityTesting\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">continuous security testing<\/span><\/a><span data-contrast=\"auto\">\u00a0and monitoring.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Why Software Composition Analysis is a \u2018Must Have\u2019<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Software Composition Analysis, commonly referred to as SCA,\u00a0<\/span><span data-contrast=\"auto\">is a segment of the application security testing (AST) tool market that deals with managing open source component use.<\/span><span data-contrast=\"auto\">\u00a0Today\u2019s software products rely heavily on open source components.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><i><span data-contrast=\"auto\">Forrester<\/span><\/i><\/b><span data-contrast=\"auto\">\u00a0states that, \u201c<\/span><b><i><span data-contrast=\"auto\">1 in 8 open source components contain a known security vulnerability. Unfortunately, Security &amp; Development teams are struggling to find and fix them without slowing down development. In order to keep up, your company needs the right SCA solution<\/span><\/i><\/b><span data-contrast=\"auto\">.\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">One of the main functions of Software Composition Analysis tools is to identify open source components with known vulnerabilities. Good SCA solutions will not only tell you what open source libraries have known vulnerabilities, they will also tell you whether your code calls the affected library and suggest a fix when applicable. The solution should also identify open source libraries in your code base that need to be updated or patched.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Ideally, the SCA customers\u00a0<\/span><span data-contrast=\"auto\">may<\/span><span data-contrast=\"auto\">\u00a0look for\u00a0<\/span><span data-contrast=\"auto\">providers that \u2013<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"8\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">Advise developers about how to remediate vulnerabilities<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"8\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">Create consistent policies across different business units and application types<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"8\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">Report on strategic risk for security professionals and CISOs<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><b><span data-contrast=\"auto\">How can we solve the problem?<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To address the current threat landscape, one need not strive for perfection but should keep moving forward. There is a need for enterprises to adopt a mature SCA security model that includes detection, prioritization, and remediation. By having a matured SCA security model, the security professionals and developers can focus on other priorities.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As put forth by\u00a0<\/span><b><i><span data-contrast=\"auto\">Gartner<\/span><\/i><\/b><span data-contrast=\"auto\">\u00a0analyst\u00a0<\/span><b><i><span data-contrast=\"auto\">Neil MacDonald<\/span><\/i><\/b><span data-contrast=\"auto\">, \u201c<\/span><b><i><span data-contrast=\"auto\">Perfect security is impossible. Zero risk is impossible. We must bring continuous risk and trust-based assessment and prioritization of application vulnerabilities to\u00a0<\/span><\/i><\/b><b><i><span data-contrast=\"auto\">DevSecOps<\/span><\/i><\/b><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A mature SCA tool\u00a0<\/span><span data-contrast=\"auto\">may<\/span><span data-contrast=\"auto\">\u00a0include technologies that prioritize open source vulnerabilities. Enterprises\u00a0<\/span><span data-contrast=\"auto\">can<\/span><span data-contrast=\"auto\">\u00a0prioritize these open source vulnerabilities by automatically identifying the security vulnerabilities that present the bigger risk.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">After prioritization, it is\u00a0<\/span><span data-contrast=\"auto\">equally\u00a0<\/span><span data-contrast=\"auto\">imperative to remediate these vulnerabilities automatically<\/span><span data-contrast=\"auto\">. Based on the security vulnerability policies triggered by vulnerability detection &amp; severity, automated remediation workflows can be initiated. A good SCA solution helps you keep your open source components continuously patched to avoid being exposed to known vulnerabilities.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The main challenge in today\u2019s complex digital world lies in securing your application. With the right Software Composition Analysis solution, you are one step closer to mitigating your open source risk.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Cigniti invites you to join an interesting webinar where Rajesh\u00a0<\/span><span data-contrast=\"auto\">Sarangapani<\/span><span data-contrast=\"auto\">, Head of Innovation &amp; Practice at Cigniti will be joined by\u00a0<\/span><span data-contrast=\"auto\">Mitun<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Zavery<\/span><span data-contrast=\"auto\">, Director Pre-Sales Engineering,\u00a0<\/span><span data-contrast=\"auto\">Sonatype<\/span><span data-contrast=\"auto\">\u00a0to discuss how enterprises need to secure not just the code they write, but also the code they consume from open source projects. The session will help the attendees understand the state of open source consumption and the risks involved with it. They will also get an understanding on why Software Composition Analysis is a \u2018must have\u2019 and how<\/span><span data-contrast=\"auto\">\u00a0can<\/span><span data-contrast=\"auto\">\u00a0the open source challenges be dealt with.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.cigniti.com\/webinar\/sonatype-manage-open-source-risk-but-keep-engineering-empowered\/?utm_source=blog&amp;utm_medium=hyperlink&amp;utm_campaign=sonatype_webinar\" class=\"broken_link\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Register for the webinar<\/span><\/a><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"auto\">and save your spot to listen\u00a0<\/span><span data-contrast=\"auto\">to some interesting insights\u00a0<\/span><span data-contrast=\"auto\">on Feb 24th, 2021.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Being a global leader in independent\u202f<\/span><a href=\"https:\/\/www.cigniti.com\/services\/quality-engineering\/?utm_source=blog&amp;utm_medium=hyperlink&amp;utm_campaign=QualityEngineering\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">quality engineering\u202fservices<\/span><\/a><span data-contrast=\"auto\">, Cigniti is a strong advocate of Quality Assurance and its implementation right from the early stages of the software lifecycle.\u202fWe\u202fencourage customer feedback and believe in including such feedback in\u202four\u202fbroader testing approach. We take great measures to ensure that we are fully equipped with state-of-the-art services and have partnered with other experts that specialize in providing testing services.<\/span><span data-contrast=\"none\">\u202f<\/span><a href=\"https:\/\/www.cigniti.com\/contact-us\/#utm_source=blog&amp;utm_medium=hyperlink&amp;utm_campaign=ContactUs\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Talk to us<\/span><\/a><span data-contrast=\"none\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the major challenges faced by developers\u00a0is to create a unique, customized, and compelling customer\u00a0experience\u00a0quickly.\u00a0As a result, they no longer write all their own code to solve every problem.\u00a0Instead, they assemble, configure, and automate their code and often rely on common open source\u00a0components to quickly add application functionality.\u00a0\u00a0 One recent study showed a 21% [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":15218,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[86,2093],"tags":[3421,3422,3420,3418,3424,2158,222,3425,3419,3423,1864],"ppma_author":[3727],"class_list":["post-15217","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-software-quality-assurance","category-quality-engineering","tag-enteprise-security","tag-enterpise-open-source","tag-open-source-application-security","tag-open-source-security","tag-open-source-test-automation","tag-quality-assurance-services","tag-quality-engineering","tag-shift-left-security-approach","tag-software-security-testing-services","tag-sonatype-webinar","tag-vulnerability-assessment"],"authors":[{"term_id":3727,"user_id":20,"is_guest":0,"slug":"cigniti","display_name":"About Cigniti (A Coforge Company)","avatar_url":{"url":"https:\/\/coforge.site\/cigniti\/blog\/wp-content\/uploads\/2024\/10\/Coforge-blog-Logo.png","url2x":"https:\/\/coforge.site\/cigniti\/blog\/wp-content\/uploads\/2024\/10\/Coforge-blog-Logo.png"},"author_category":"","user_url":"https:\/\/www.cigniti.com\/","last_name":"(A Coforge Company)","first_name":"About Cigniti","job_title":"","description":"Cigniti Technologies Limited, a Coforge company, is the world\u2019s leading AI &amp; IP-led Digital Assurance and Digital Engineering services provider. Headquartered in Hyderabad, India, Cigniti\u2019s 4200+ employees help Fortune 500 &amp; Global 2000 enterprises across 25 countries accelerate their digital transformation journey across various stages of digital adoption and help them achieve market leadership by providing transformation services leveraging IP &amp; platform-led innovation with expertise across multiple verticals and domains.\r\n<br>\r\nLearn more about Cigniti at <a href=\"https:\/\/www.cigniti.com\/\">www.cigniti.com<\/a> and about Coforge at <a href=\"https:\/\/www.coforge.com\/\">www.coforge.com<\/a>."}],"_links":{"self":[{"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/posts\/15217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/comments?post=15217"}],"version-history":[{"count":0,"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/posts\/15217\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/media\/15218"}],"wp:attachment":[{"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/media?parent=15217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/categories?post=15217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/tags?post=15217"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/coforge.site\/cigniti\/blog\/wp-json\/wp\/v2\/ppma_author?post=15217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}