Software Composition Analysis 4 Key Elements of Technical Due Diligence Explore key areas of conducting technical due diligence, including auditing third-party software usage and evaluating protections on intellectual property.
Software Composition Analysis Q and A: Software Bill of Materials and FOSSA Get answers to frequently asked questions about using FOSSA to generate a software bill of materials.
Open Source Vulnerability Management Anatomy of a Software Supply Chain Attack Software supply chain attacks are an increasingly common and dangerous type of cyberattack. Here's how to defend against them.
Software Composition Analysis How to Generate an SBOM with FOSSA See how your organization can use FOSSA to generate a comprehensive software bill of materials in a few easy steps.
Open Source in the News bouk/monkey and the Importance of Knowing Your Dependencies A recent news item involving the bouk/monkey open source program shows why it's so important for organizations to have visibility into their dependencies.
Inside FOSSA Role-Based Access Control (RBAC), Zero Trust, and FOSSA Get an overview of FOSSA's role-based access control (RBAC), and see how it can help improve your organization's security posture.
Software Composition Analysis 3 Best Practices for OSS Management in the Automotive Industry Experts share tips and strategies to help automotive organizations improve their open source management programs.
Inside FOSSA FOSSA Product Updates: August 2021 FOSSA has launched several new features, including container scanning, analysis target configuration, expanded language support, and more.
Inside FOSSA FOSSA Receives Highest Scores Possible in License Risk Management, SBOM Criteria in Forrester Wave FOSSA was the only vendor to earn the highest possible score in both the SBOM and License Risk Management criteria.
Open Source License Compliance Open Source Software Licenses 101: The LGPL License The LGPL open source software license is a member of the GPL family, but with some significant differences from its stronger copyleft counterparts.
Open Source License Compliance Open Source Software Licenses 101: The AGPL License Get an overview of the AGPL open source software license, including requirements and key provisions.
Inside FOSSA Announcing FOSSA Container Scanning We're excited to introduce FOSSA Container Scanning, which will help organizations reduce compliance and security risk in their container images.
Open Source in the News Stockfish vs. ChessBase and What it Means for GPL v3 Stockfish vs. ChessBase could test several key provisions of GPL v3. Here's our analysis of the case, with input from OSS compliance expert Heather Meeker.
Software Composition Analysis The Minimum Required Elements of an SBOM As part of its new cybersecurity executive order, the U.S. Federal government released the minimum required elements for a software bill of materials.
Open Source License Compliance Analyzing the Legal Implications of GitHub Copilot The release of GitHub Copilot raises questions about potential copyright infringement and license compliance issues.
Open Source Vulnerability Management Container Image Security and Vulnerability Scanning Get an overview of today's container image security landscape, including common attack vectors and the importance of vulnerability scanning.
Open Source Vulnerability Management All About CWE-79: Cross-Site Scripting CWE-79: Cross Site Scripting (XSS) is one of today's most commonly found vulnerabilities. Here's a look at different types of XSS attacks and how to stop them.
Open Source License Compliance Copyleft Licenses and the Venture Capital Connection There's an easy-to-miss OSS compliance clause in the National Venture Capital Association's Stock Purchase Agreement Model Form that has significant ramifications.
Open Source License Compliance All About Permissive Licenses Explore the history, use cases, and provisions of permissive software licenses. Plus, see how they compare to copyleft licenses.
Open Source in the News Cybersecurity Executive Order and Software Supply Chain Security See our top takeaways from the software supply chain security section of the Biden Administration's cybersecurity executive order.
Software Composition Analysis IT Central Station: What Makes for an Effective SCA Solution Enterprise technology review site IT Central Station shares insight from software composition analysis (SCA) users on the elements of an effective SCA solution.
Open Source License Compliance All About Copyleft Licenses Get an overview of copyleft software licenses, including key provisions and how they compare to permissive licenses.
Open Source Vulnerability Management Application Security for Developers: SCA, DAST, and GitHub Actions See how tools like SCA and DAST can fuel developer-centric application security, and get step-by-step guidance for using them in GitHub Actions.
Software Composition Analysis Software Bill Of Materials (SBOM) Formats, Use Cases, and Specifications SBOMs plays an important role in everything from application security to OSS license compliance. Learn about popular formats and use cases.
Software Composition Analysis How SCA Helps Manage OSS Vulnerabilities See four ways software composition analysis (SCA) helps organizations identify and manage potential vulnerabilities in OSS.