Get an overview of the SPDX software bill of materials specification. See SPDX SBOM use cases, document structure, data fields, and more.| fossa.com
A comprehensive overview of SBOMs (software bill of materials): their data fields, use cases, and formats, why they’re needed, and how to manage them.| fossa.com
Get an overview of the CISA KEV Catalog, including strategies for using the list in vulnerability prioritization and management initiatives.| Dependency Heaven
SPDX 3.0 introduces new profiles for better use case targeting and flexibility. Major upgrades include changes in document structure, profiles, relationships, and creator information.| fossa.com
Explore different SBOM formats like SPDX and CycloneDX, their specifications, and their implications for software transparency and cybersecurity.| fossa.com
A summary of the key insights from the ESF's latest recommendations on OSS and SBOM management.| fossa.com
A detailed comparison of SCA and SAST security tools, highlighting their differences and combined use for enhanced security.| fossa.com