News Desk 2024: Eyal Paz and Liad Cohen on Transitive Vulnerabilities

Will We Survive The Transitive Vulnerability Locusts

Understanding and Mitigating the Risks of Transitive Vulnerabilities in Application Security At OX Security, our mission is to eliminate manual AppSec processes. Our latest research, presented at Black Hat 2024, highlights a ...
Making Sense of Open-Source Vulnerability Databases: NVD, OSV, and more

Making Sense of Open-Source Vulnerability Databases: NVD, OSV, and more

| | DevSecOps, SCA
Essential reading for developers and security professionals alike: a comprehensive comparison of vulnerability databases to help you cut through the noise ...
Understanding Supply Chain Risk - Using SCA to protect your application

H1 SCA Roundup – Defending Users Against Constantly Evolving Cyber Threats

| | Product News, SCA
Learn more about GitGuardian SCA commitment and fast adaptation strategies to safeguard the software supply chain of its users ...
Software Composition Analysis [Security Zines]

Software Composition Analysis [Security Zines]

| | SCA, Security Zines
For those feeling code-conscious about shady dependencies lurking in their apps, Software Composition Analysis is the software security wellness check you need! ...
The changing face of software supply chain security risk

The changing face of software supply chain security risk

Learn about the six key findings from the 2024 State of Software Supply Chain Security Risks from the Ponemon Institute.The post The changing face of software supply chain security risk appeared first ...
How Software Composition Analysis (SCA) Addresses President Biden's Executive Order (EO) 14028

How Software Composition Analysis (SCA) Addresses President Biden’s Executive Order (EO) 14028

EO 14028 is bringing a lot of new security documentation requirements with it. Here's how SCA can help with creating that documentation ...
Building a software Bill of Materials with Black Duck

Building a software Bill of Materials with Black Duck

Explore how Black Duck's SBOM export capabilities foster compliance with standards, customer trust, and enhance software supply chain security.The post Building a software Bill of Materials with Black Duck appeared first on ...

What to Consider When Choosing a Software Composition Analysis (SCA) Tool

| | SCA
Given the widespread use of third-party components in application development, identifying and remediating code vulnerabilities as early in development as possible is critical. As a result, many organizations turn to SCA tools, ...
Why you need an SBOM (Software Bill Of Materials)

Why you need an SBOM (Software Bill Of Materials)

SBOMs are security analysis artifacts becoming required by more companies due to internal policies and government regulation. If you sell or buy software, you should know the what, why, and how of ...
Why you need an SBOM (Software Bill Of Materials)

Why you need an SBOM (Software Bill Of Materials)

SBOMs are security analysis artifacts becoming required by more companies due to internal policies and government regulation. If you sell or buy software, you should know the what, why, and how of ...

Application Security Check Up