#SoftwareCompositionAnalysis

2025-05-26

When using open source software, YOU become the security supplier.

Discover how SCA scanning helps manage this responsibility and protect your applications from vulnerabilities like Log4j and XZ Utils: anchore.com/software-supply-ch

#SoftwareCompositionAnalysis #SCA #OpenSource

2025-05-20

With up to 90% of applications built on open source code, SCA tools are no longer optional—they're essential.

Learn how Software Composition Analysis protects your organization from supply chain vulnerabilities: anchore.com/software-supply-ch

#SoftwareCompositionAnalysis #SCA

Antonio Francesco Sardellam3ssap0@infosec.exchange
2024-11-07
2023-09-13

⚠️ Beware of "alert fatigue" in your security processes!

Learn why integrating #SoftwareCompositionAnalysis in your CI/CD pipeline is crucial for safeguarding your software from vulnerabilities: bit.ly/3LnT6Ci

#InfoQ article by Lukáš Křečan

#Java #SCA #CI #CD #SecurityVulnerabilities

Gareth Emslie 🇿🇦 🇪🇦 🇨🇭keyoke_za@hachyderm.io
2022-12-28

Log4Shell, a critical vulnerability discovered in December 2021 and officially tracked as CVE-2021-44228, has had a long-lasting impact, prompting enterprises to adopt software composition analysis and secure supply chain management practices. Despite receiving patches and widespread attention, it remains a common cause for security breaches a year later. csoonline.com/article/3684108/ #Log4Shell #CVE2021-44228 #SoftwareCompositionAnalysis #SecureSupplyChainManagement

Antonio Francesco Sardellam3ssap0@infosec.exchange
2022-11-30

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst