Bengaluru: Wipro, a global technology and consulting company, has partnered with US-based software supply chain security firm Lineaje to enhance the security of open-source components in enterprise software.
The collaboration focuses on addressing vulnerabilities in open-source software, a critical issue as organizations increasingly rely on third-party components in their applications. Wipro will integrate Lineaje’s tools, including Open-Source Manager to provide businesses with a centralized approach to identifying and mitigating software vulnerabilities.
Open-source software is often a target for supply chain attacks due to its widespread use and potential hidden dependencies. Lineaje’s technology offers detailed analysis of software components, mapping out known and unknown dependencies while assessing associated risks. By leveraging these insights, Wipro aims to provide businesses with end-to-end visibility into their software supply chains, enabling them to verify authenticity and address vulnerabilities proactively.
Nikos Anerousis, Vice President of Engineering Edge at Wipro, emphasized the importance of tackling supply chain risks. “Supply chain attacks often exploit third-party services and open-source software. This partnership aligns with our commitment to safeguarding modern software development and enterprise systems,” he said.
Javed Hasan, CEO of Lineaje, highlighted the growing need for robust software security. “Organizations must manage the risks their software poses to operations and customers. Our partnership with Wipro aims to strengthen enterprises’ ability to secure their software supply chains,” he noted.
Through this partnership, Wipro and Lineaje aim to support enterprises in centralizing risk management, identifying critical vulnerabilities, and ensuring the integrity of their software ecosystems. As supply chain attacks continue to rise, this collaboration addresses an urgent need for proactive security measures in enterprise software development.































































Discussion about this post