If you're not using automation to monitor the security risks from your dependency tree, chances are your project is vulnerable. Although these vulnerabilities may not be malicious, they can still…
At Open Source Summit North America earlier this year as a 10th grader, Nathan Naveen, gave a talk about OpenSSF Criticality Score. Nathan takes a look at why understanding tools…
While many in the industry realize the value of having a software bill of materials, creators still need to generate high-fidelity SBOMs, and software consumers must ingest and enforce actions…
Fuzz Introspector is an open source tool that at its core provides insights and suggestions for improvements on how a given project is being fuzzed. In this blog post we…
SBOMs enable organizations to identify vulnerabilities, track open-source usage, and ensure compliance with numerous licensing obligations. Having a āsingle source of truthā for security and licensing information helps everyone. Letās…
Letās get it out of the way early: itās not always clear how you can best plug into organizations like OpenSSF. Thatās why Iām writing this guest blog post as…
Itās important to distinguish the term āsourceā (any source of a good or service) from the term āvendorā (a source who is paid and has a contractual relationship), especially when…
The use of SBOMs is becoming increasingly essential in managing software supply chains. The main consumption use case is for evaluating dependencies known-vulnerabilities risk, by mapping the dependencies listed in…
Weāve been discussing the creation of SBOMs for over ten years, but has it gotten us any closer to hardening our software development practices? SBOMs provide critical supply chain data,…
Security used to be something of an afterthought in software development. Security was clunky or inconvenient, often because it was a ābolt-onā. That has rapidly changed over the last two…