When using open source software, YOU become the security supplier.
Discover how SCA scanning helps manage this responsibility and protect your applications from vulnerabilities like Log4j and XZ Utils: https://anchore.com/software-supply-chain-security/software-composition-analysis/
#SoftwareCompositionAnalysis #SCA #OpenSource
With up to 90% of applications built on open source code, SCA tools are no longer optional—they're essential.
Learn how Software Composition Analysis protects your organization from supply chain vulnerabilities: https://anchore.com/software-supply-chain-security/software-composition-analysis/
#SoftwareCompositionAnalysis #SCA

Everything You Need to Know About Software Composition Analysis (SCA)
Learn the ins and outs of software composition analysis along with expert tips for implementation from the cybersecurity experts at Anchore.
Anchore
DEF CON 32 - Your CI CD Pipeline Is Vulnerable, But It's Not Your Fault - Elad Pticha, Oreen Livni
YouTube
Manifest Confusion in PyPI
How some Python tools interpret dependencies differently.
stiankri's blog⚠️ Beware of "alert fatigue" in your security processes!
Learn why integrating #SoftwareCompositionAnalysis in your CI/CD pipeline is crucial for safeguarding your software from vulnerabilities: https://bit.ly/3LnT6Ci
#InfoQ article by Lukáš Křečan
#Java #SCA #CI #CD #SecurityVulnerabilities

Dealing with Java CVEs: Discovery, Detection, Analysis, and Resolution
This article discusses the role of SCA in CI/CD pipelines, emphasizing human oversight for accurate vulnerability assessment and the importance of specialized security tools.
InfoQLog4Shell, a critical vulnerability discovered in December 2021 and officially tracked as CVE-2021-44228, has had a long-lasting impact, prompting enterprises to adopt software composition analysis and secure supply chain management practices. Despite receiving patches and widespread attention, it remains a common cause for security breaches a year later.
https://www.csoonline.com/article/3684108/log4shell-remains-a-big-threat-and-a-common-cause-for-security-breaches.html#tk.rss_all #Log4Shell #CVE2021-44228
#SoftwareCompositionAnalysis #SecureSupplyChainManagement
Log4Shell remains a big threat and a common cause for security breaches
Log4Shell is likely to remain a favored vulnerability to exploit as organizations lack visibility into their software supply chains.
CSO Online
Invisible npm malware - evading security checks with crafted versions | JFrog
The npm CLI has a very convenient and well-known security feature – when installing an npm package, the CLI checks the package and all of its dependencies for well-known vulnerabilities – The check is triggered on package installation (when running npm install) but can also be triggered manually by running npm audit. This is an …
JFrog