Dangerous by Design? By Jillian Bommarito|2023-03-06T13:19:46-05:00March 6th, 2023|Categories: Blog|Tags: dependencies, dilligencer, open source, SBOM, security, software, supply chain, vulnerabilities| Read More
Four Reasons Why SCA Isn’t Solving Your Supply Chain Security Issues By Michael Bommarito|2022-04-12T15:38:00-04:00April 5th, 2022|Categories: Blog|Tags: dependencies, open source, SCA, static analysis, supply chain| Read More
What is Software Composition Analysis and What Are the Limitations? By Michael Bommarito|2022-04-23T11:50:49-04:00April 5th, 2022|Categories: Blog|Tags: data, dependencies, machine learning, SBOM, SCA, software| Read More
Snake JARs, Part III: Data Science Sssssss-security By Michael Bommarito|2022-04-12T15:54:00-04:00February 9th, 2022|Categories: Blog|Tags: data science, data science policy, dependencies, Java, python, research, risk management, security, vulnerabilities| Read More
Snake JARs, Part I: Hidden log4j Dependencies in Python Packages By Michael Bommarito|2022-04-12T15:54:32-04:00January 24th, 2022|Categories: Blog|Tags: dependencies, python, research, SBOM, security, vulnerabilities| Read More
Snake JARs, Part II: Fangs in the Grass By Michael Bommarito|2022-04-12T15:55:29-04:00January 24th, 2022|Categories: Blog|Tags: dependencies, python, research, SBOM, security, vulnerabilities| Read More
What are software dependencies? By Jacob Pulice|2022-04-17T20:35:45-04:00June 13th, 2021|Categories: Blog|Tags: dependencies, development, explainer, imports, open source, risks, software, supply chain| Read More