FOSSA logo
Platform
FOSSA Platform
The Modern Open Source Risk Management Platform
FOSSA Platform
Product
Vulnerability Management
License Compliance
Solutions
SBOM Management
Continuous Compliance
Due Diligence
Shift Code Security Left
Generative AI Risk Management
Resources
Getting Started with FOSSA
Documentation
Blog
Resource Library
Events
tl;drLegal
Company
About FOSSA
Customers
Careers
Partners
Press
Contact Us
For Developers
Pricing
Log In
|
Start for Free
Schedule Demo
Log In
|
Sign Up
|
  • Vulnerability Management
  • License Compliance
  • Open Source in the News
  • Software Composition Analysis
  • Developers

Software Composition Analysis

A collection of 49 posts

Imagery that depicts characteristics of a medical device
Open Source Vulnerability Management

Complying with the FDA’s SBOM Requirements

The FDA now requires medical device manufacturers to submit an SBOM (software bill of materials) as part of the premarket review process.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
6 min read
SCA vs. SAST: Comparing Security Tools
Software Composition Analysis

SCA vs. SAST: Comparing Security Tools

SCA and SAST both support security use cases, but there there are some significant differences between the tools.

  • FOSSA Editorial Team
    FOSSA Editorial Team
4 min read
SBOM Examples, Explained
Software Composition Analysis

SBOM Examples, Explained

See two SBOM examples, including practical explanations for data fields and document sections.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
7 min read
Understanding and Using SPDX License Identifiers and License Expressions
Software Composition Analysis

Understanding and Using SPDX License Identifiers and License Expressions

Learn about SPDX License Identifiers and License Expressions, and see how you can use them to communicate licensing information in an SBOM.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
5 min read
5 Ways SBOM Can Strengthen Security
Open Source Vulnerability Management

5 Ways SBOM Can Strengthen Security

See five ways SBOMs can improve security, including enhanced visibility into vulnerabilities and support for remediation.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
5 min read
An Early Look at SPDX 3.0
Software Composition Analysis

An Early Look at SPDX 3.0

See what to expect with the upcoming release of SPDX v3.0, such as the introduction of use case-specific profiles and increased flexibility.

  • FOSSA Editorial Team
    FOSSA Editorial Team
6 min read
What’s New in CycloneDX 1.5?
Software Composition Analysis

What’s New in CycloneDX 1.5?

A new version of the CycloneDX bill of materials specification has been released. See what's new in CycloneDX v1.5.

  • Tom Alrich
    Tom Alrich
7 min read
VEX (Vulnerability Exploitability eXchange): Purpose and Use Cases
Open Source Vulnerability Management

VEX (Vulnerability Exploitability eXchange): Purpose and Use Cases

Learn about VEX (Vulnerability Exploitability eXchange), which is used to communicate whether vulnerabilities impacting software products are actually exploitable.

  • Tom Alrich
    Tom Alrich
10 min read
The FOSSA Podcast: SCA Purchasing and Implementation Trends
Software Composition Analysis

The FOSSA Podcast: SCA Purchasing and Implementation Trends

Episode 4 of The FOSSA Podcast discusses how organizations are evaluating SCA tools along with important factors in a successful implementation.

  • FOSSA Editorial Team
    FOSSA Editorial Team
5 min read
A Framework for Evaluating SBOM Tools
Software Composition Analysis

A Framework for Evaluating SBOM Tools

Customizability, ease of use, and support for CycloneDX and SPDX are among the most important features of a best-in-class SBOM tool.

  • FOSSA Editorial Team
    FOSSA Editorial Team
7 min read
2023 Open Source Management Trends, Predictions, and Observations
Open Source in the News

2023 Open Source Management Trends, Predictions, and Observations

In 2023, we expect organizations to prioritize using SBOM data, automating open source license compliance, and maintaining visibility into software composition.

  • FOSSA Editorial Team
    FOSSA Editorial Team
5 min read
How Applause Makes Open Source Management Work for Developers
Software Composition Analysis

How Applause Makes Open Source Management Work for Developers

See how Applause has built developer-friendly open source license compliance and security programs with a significant assist from FOSSA.

  • FOSSA Editorial Team
    FOSSA Editorial Team
5 min read
Highlights from NIST SP 800-161r1: Cybersecurity Supply Chain Risk Management
Software Composition Analysis

Highlights from NIST SP 800-161r1: Cybersecurity Supply Chain Risk Management

See key themes and insights from NIST SP 800-161r1: “Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations.”

  • FOSSA Editorial Team
    FOSSA Editorial Team
7 min read
Best Practices for Implementing Software Composition Analysis, Featuring Rancher Labs
Software Composition Analysis

Best Practices for Implementing Software Composition Analysis, Featuring Rancher Labs

Rancher Labs Senior Engineering Manager Hayden Barnes shares four strategies to help ensure a successful software composition analysis implementation.

  • Hayden Barnes
5 min read
4 Reasons Rancher Labs Chose FOSSA
Software Composition Analysis

4 Reasons Rancher Labs Chose FOSSA

See why Kubernetes management company Rancher Labs (part of SUSE) chose FOSSA to reduce open source license compliance and vulnerability risk.

  • FOSSA Editorial Team
    FOSSA Editorial Team
5 min read
Building a Sustainable Software Supply Chain
Software Composition Analysis

Building a Sustainable Software Supply Chain

OpenChain GM Shane Coughlan discusses indicators of sustainable software and specific steps your organization can take to improve security.

  • Shane Coughlan
10 min read
Announcing New Support for C/C++ Scanning, SBOMs
Inside FOSSA

Announcing New Support for C/C++ Scanning, SBOMs

FOSSA has released new features that enable C/C++ dependency scanning and make it easier for organizations to generate SBOMs.

  • Gauthami Polasani
    Gauthami Polasani
2 min read
How FOSSA Addresses Challenges Scanning C/C++ Code
Software Composition Analysis

How FOSSA Addresses Challenges Scanning C/C++ Code

Get an overview of challenges with scanning and identifying dependencies in C/C++ code, and see how FOSSA addresses these issues.

  • FOSSA Editorial Team
    FOSSA Editorial Team
6 min read
6 Takeaways from the Linux Foundation's SBOM Report
Open Source in the News

6 Takeaways from the Linux Foundation's SBOM Report

A new report from the Linux Foundation contains a treasure trove of data on industry attitudes toward SBOMs and software supply chain security.

  • FOSSA Editorial Team
    FOSSA Editorial Team
5 min read
React Security: How to Fix Common Vulnerabilities
Open Source Vulnerability Management

React Security: How to Fix Common Vulnerabilities

Explore several common vulnerabilities that impact React component libraries and see how to remediate them.

  • Gaya Dissanayake
    Gaya Dissanayake
4 min read
5 Must-Have DevSecOps Tools
Software Composition Analysis

5 Must-Have DevSecOps Tools

Software composition analysis, static application security testing, and issue tracking software are examples of mission-critical DevSecOps tools.

  • FOSSA Editorial Team
    FOSSA Editorial Team
4 min read
4 Key Elements of Technical Due Diligence
Software Composition Analysis

4 Key Elements of Technical Due Diligence

Explore key areas of conducting technical due diligence, including auditing third-party software usage and evaluating protections on intellectual property.

  • FOSSA Editorial Team
    FOSSA Editorial Team
5 min read
Q and A: Software Bill of Materials and FOSSA
Software Composition Analysis

Q and A: Software Bill of Materials and FOSSA

Get answers to frequently asked questions about using FOSSA to generate a software bill of materials.

  • FOSSA Editorial Team
    FOSSA Editorial Team
6 min read
Anatomy of a Software Supply Chain Attack
Open Source Vulnerability Management

Anatomy of a Software Supply Chain Attack

Software supply chain attacks are an increasingly common and dangerous type of cyberattack. Here's how to defend against them.

  • Matthew Schwartz
    Matthew Schwartz
6 min read
How to Generate an SBOM with FOSSA
Software Composition Analysis

How to Generate an SBOM with FOSSA

See how your organization can use FOSSA to generate a comprehensive software bill of materials in a few easy steps.

  • Deepak Mehta
5 min read
  • For the Love of Open Source © 2024 FOSSA, Inc.
  • Privacy Policy
  • Terms & Conditions