FOSSA logo
Platform
FOSSA Platform
The Modern Open Source Risk Management Platform
FOSSA Platform
Product
Vulnerability Management
License Compliance
Solutions
SBOM Management
Continuous Compliance
Due Diligence
Shift Code Security Left
Generative AI Risk Management
Resources
Getting Started with FOSSA
Documentation
Blog
Resource Library
Events
tl;drLegal
Company
About FOSSA
Customers
Careers
Partners
Press
Contact Us
For Developers
Pricing
Log In
|
Start for Free
Schedule Demo
Log In
|
Sign Up
|

Dependency Heaven

Open source, dependencies, and licensing by the people at FOSSA.

  • Vulnerability Management
  • License Compliance
  • Open Source in the News
  • Software Composition Analysis
  • Developers

Featured Articles

Heather Meeker on Open Source License Compliance Tools
Open Source License Compliance

Heather Meeker on Open Source License Compliance Tools

Leading OSS licensing expert Heather Meeker shares guidance to help organizations evaluate new compliance tools and get more value from existing ones.

  • Heather Meeker
    Heather Meeker
9 min read
Customer Q&A: Collibra's Journey to Scaling OSS License Compliance
Open Source License Compliance

Customer Q&A: Collibra's Journey to Scaling OSS License Compliance

Amanda Weare, Collibra’s VP and Deputy General Counsel, discusses her experience managing Collibra's open source license compliance program.

  • FOSSA Editorial Team
    FOSSA Editorial Team
6 min read
Imagery that depicts characteristics of a medical device
Open Source Vulnerability Management

Complying with the FDA’s SBOM Requirements

The FDA now requires medical device manufacturers to submit an SBOM (software bill of materials) as part of the premarket review process.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
6 min read
Enable Global Visibility and Swift Remediation with Package Index
Inside FOSSA

Enable Global Visibility and Swift Remediation with Package Index

Package Index offers comprehensive visibility into your software supply main, making it much easier to find a specific package or vulnerability.

  • Christian Capdeville
    Christian Capdeville
3 min read
4 Takeaways from the ESF’s OSS and SBOM Management Recommendations
Open Source in the News

4 Takeaways from the ESF’s OSS and SBOM Management Recommendations

A new publication from the Enduring Security Framework (ESF) working group includes recommendations to help organizations manage SBOMs and OSS-related risks.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
5 min read
Reduce Alert Fatigue with FOSSA’s Auto-Ignore Rules
Inside FOSSA

Reduce Alert Fatigue with FOSSA’s Auto-Ignore Rules

Explore the recently launched auto-ignore feature, which streamlines issue resolution across multiple projects and package versions

  • Christian Capdeville
    Christian Capdeville
3 min read
Terrapin (CVE-2023-48795): New Attack Impacts the SSH Protocol
Open Source Vulnerability Management

Terrapin (CVE-2023-48795): New Attack Impacts the SSH Protocol

The recently announced Terrapin attack (CVE-2023-48795) impacts the popular SSH protocol. Here’s what you need to know about the vulnerability.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
3 min read
SCA vs. SAST: Comparing Security Tools
Software Composition Analysis

SCA vs. SAST: Comparing Security Tools

SCA and SAST both support security use cases, but there there are some significant differences between the tools.

  • FOSSA Editorial Team
    FOSSA Editorial Team
4 min read

Thank you for submitting details. Your email address is added to our subscription list.

Dual-Licensing Models Explained, Featuring Heather Meeker
Open Source License Compliance

Dual-Licensing Models Explained, Featuring Heather Meeker

Dual licensing is when software is offered under either a choice between licenses — or when multiple licenses must be applied simultaneously.

  • Heather Meeker
    Heather Meeker
4 min read
A Comprehensive Guide to Source-Available Software Licenses, Featuring Heather Meeker
Open Source License Compliance

A Comprehensive Guide to Source-Available Software Licenses, Featuring Heather Meeker

Leading software licensing expert Heather Meeker discusses source-available software licenses, including their key provisions and requirements.

  • Heather Meeker
    Heather Meeker
9 min read
Understanding and Using the EPSS Scoring System
Open Source Vulnerability Management

Understanding and Using the EPSS Scoring System

EPSS (Exploit Prediction Scoring System) measures how likely a vulnerability is to be exploited in the wild.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
4 min read
Best Practices for Generating High-Quality SBOMs
Open Source Vulnerability Management

Best Practices for Generating High-Quality SBOMs

The more accurate and comprehensive an SBOM is, the more valuable it will be. See considerations and strategies for generating high-quality SBOMs in your organization.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
7 min read
Curl Vulnerabilities: Impact and Fixes (Curl 8.4.0)
Open Source Vulnerability Management

Curl Vulnerabilities: Impact and Fixes (Curl 8.4.0)

New vulnerabilities impacting the popular Curl command line tool and library were disclosed on Oct. 11. See details and fixes.

  • Sara Beaudet
3 min read
5 Ways to Reduce GitHub Copilot Security and Legal Risks
Open Source License Compliance

5 Ways to Reduce GitHub Copilot Security and Legal Risks

See how to manage the potential security, legal, privacy, and maintainability risks that can come with using AI coding tools.

  • Jessica Black
    Jessica Black
6 min read
Snippet Scanning, Explained
Open Source License Compliance

Snippet Scanning, Explained

Get an overview of snippet scanning, including its purpose and how it works, and learn about FOSSA's approach.

  • Jessica Black
    Jessica Black
2 min read
SBOM Examples, Explained
Software Composition Analysis

SBOM Examples, Explained

See two SBOM examples, including practical explanations for data fields and document sections.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
7 min read
Understanding and Using SPDX License Identifiers and License Expressions
Software Composition Analysis

Understanding and Using SPDX License Identifiers and License Expressions

Learn about SPDX License Identifiers and License Expressions, and see how you can use them to communicate licensing information in an SBOM.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
5 min read
Business Source License (BSL 1.1): Requirements, Provisions, and History
Open Source License Compliance

Business Source License (BSL 1.1): Requirements, Provisions, and History

See key requirements and provisions in the Business Source License (BSL), a middle ground of sorts between open source and end-user licenses.

  • Manuel Harnisch
    Manuel  Harnisch
5 min read
5 Ways SBOM Can Strengthen Security
Open Source Vulnerability Management

5 Ways SBOM Can Strengthen Security

See five ways SBOMs can improve security, including enhanced visibility into vulnerabilities and support for remediation.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
5 min read
FOSSA Product Updates: August 2023
Inside FOSSA

FOSSA Product Updates: August 2023

Get an overview of additions and improvements to the FOSSA platform, including Jira enhancements and auto-ignore rules.

  • FOSSA Editorial Team
    FOSSA Editorial Team
3 min read
Direct Dependencies vs. Transitive Dependencies
Developer Perspectives

Direct Dependencies vs. Transitive Dependencies

See the difference between direct dependencies and transitive dependencies, including example dependency graphs.

  • Sara Beaudet
3 min read
An Early Look at SPDX 3.0
Software Composition Analysis

An Early Look at SPDX 3.0

See what to expect with the upcoming release of SPDX v3.0, such as the introduction of use case-specific profiles and increased flexibility.

  • FOSSA Editorial Team
    FOSSA Editorial Team
6 min read
Vulnerability Remediation Tactics
Open Source Vulnerability Management

Vulnerability Remediation Tactics

Explore strategies for remediating vulnerabilities in third-party software components, including pros and cons for each.

  • Eliza Zhang
    Eliza Zhang
8 min read
What’s New in CycloneDX 1.5?
Software Composition Analysis

What’s New in CycloneDX 1.5?

A new version of the CycloneDX bill of materials specification has been released. See what's new in CycloneDX v1.5.

  • Tom Alrich
    Tom Alrich
7 min read
VEX (Vulnerability Exploitability eXchange): Purpose and Use Cases
Open Source Vulnerability Management

VEX (Vulnerability Exploitability eXchange): Purpose and Use Cases

Learn about VEX (Vulnerability Exploitability eXchange), which is used to communicate whether vulnerabilities impacting software products are actually exploitable.

  • Tom Alrich
    Tom Alrich
10 min read
The FOSSA Podcast: Product Management from Startup to Enterprise
Inside FOSSA

The FOSSA Podcast: Product Management from Startup to Enterprise

The FOSSA Podcast covers engineering-product team collaboration (and friction), product management tools, when to hire your first PM, and more.

  • FOSSA Editorial Team
    FOSSA Editorial Team
9 min read
Generative AI and Software Development: Copyright Law and License Compliance
Open Source in the News

Generative AI and Software Development: Copyright Law and License Compliance

See important copyright law and open source license compliance considerations when using generative AI in software development.

  • FOSSA Editorial Team
    FOSSA Editorial Team
6 min read
  • For the Love of Open Source © 2024 FOSSA, Inc.
  • Privacy Policy
  • Terms & Conditions