No Result
View All Result
SUBMIT YOUR ARTICLES
  • Login
Monday, December 15, 2025
TheAdviserMagazine.com
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
No Result
View All Result
TheAdviserMagazine.com
No Result
View All Result
Home Market Research Market Analysis

Software Composition Analysis Is The AppSec Hero We Deserve AND Need

by TheAdviserMagazine
7 months ago
in Market Analysis
Reading Time: 3 mins read
A A
Software Composition Analysis Is The AppSec Hero We Deserve AND Need
Share on FacebookShare on TwitterShare on LInkedIn


Software composition analysis (SCA) stepped out from behind the long shadow of static application security testing (SAST)/dynamic application security testing to prove its worth years ago. And thanks to ambitious bad actors, the complex software supply chain, and generative AI (genAI) coding assistants accelerating overall code volume, SCA solutions are essential to clean up the supply chain and bolster application security.

SCA is also an application security (AppSec) darling for its ability to generate a software bill of materials (SBOM). With the EU’s Cyber Resilience Act finalized, the proposed US Department of Defense Software Fast Track Initiative requiring SBOMs, and governments such as Australia releasing guidelines for software development that include SBOMs, more software suppliers around the world will need to provide SBOMs to win and maintain business. Advanced SCA tools go beyond just generating an SBOM; they continuously monitor for newly disclosed vulnerabilities for proactive alerts and will ingest third-party SBOMs to identify the risk of incorporating a third-party component.

Opportunistic attacks that take advantage of newly introduced vulnerabilities and unpatched software require patience and timing. But attackers can be proactive by directly poisoning open-source and third-party components. These types of attacks, such as dependency confusion and typo squatting, were already on the rise. But now, “slopsquatting” happens when AI hallucinates package names that developers must add. Additionally, bad actors willing to play the long game, typically affiliated with nation states, will bully their way into maintaining obscure but widely used open-source software dependencies such as XZ Utils to bury malicious code and target downstream recipients. SCA solutions provide insight into open-source component health during selection and actively block malicious packages from being downloaded. Clearly, SCA is the AppSec hero we need.

Enterprises have been eager to embed and utilize AI in the customer-facing applications that they build. In Forrester’s 2024 survey of business and technology professionals, 33% reported using genAI in production applications. This means a whole new world of application dependencies consisting of AI models, third-party APIs, and open-source dependencies. Python is a popular language for AI applications, as is the PyPI package manager for open-source dependencies. Bad actors did not waste any time in uploading legitimate-looking but malicious packages that were downloaded hundreds of times by developers building AI applications. Poisoned AI models could be pulled down from Hugging Face and other public repositories. At the time of The Forrester Wave™: Software Composition Analysis Software, Q4 2024 evaluation, only a few SCA vendors were scanning AI models or creating AI bills of materials, but this functionality is needed broadly and quickly.

When thinking about purchasing or upgrading your SCA software, consider key insights we gathered from talking with SCA vendor customers to get the tool you not only deserve but also need:

Evaluate more than one vendor. This may seem obvious, but SCA software differs in functionality and the quality of output. Some software is primarily focused on open-source components, while others go beyond and assess third-party components and even inner-source components (those shared components written by your organization). The quality of the results also differs based on language and ability to detect vulnerabilities in transitive dependencies. Most reference customers evaluated three vendors’ software as part of the purchasing process (see figure below).
Don’t settle. You’re going to be in it for the long haul. Customer references have been with their vendor on average for over 3.5 years. And they are happy! Twenty-two of 28 references rate their vendor at a nine or 10. If you have an SCA solution and you are not satisfied, it’s worth your time to revisit this at the next renewal period.
Keep an eye out for the extras. SCA software vendors have expanded their offering to cover more of the software supply chain, such as offering malicious package detection and package firewall protection, infrastructure as code and container image scanning, and secrets detection. Depending on the vendor and its pricing and packaging model, these capabilities could be add-ons to the base price. Static reachability (the ability to determine whether the vulnerable function is called by the first-party code) should be table stakes for SCA solutions, but some vendors require you to also purchase their static SAST solution to get this level of insight.

 

Be your company’s hero and select an SCA software solution that helps secure your software supply chain by utilizing Forrester’s Buyer’s Guide: Software Composition Analysis Software, 2025, and The Forrester Wave™: Software Composition Analysis Software, Q4 2024. For more insights, schedule a guidance session or inquiry with me. Protecting your brand, your customers’ data, and your revenue is worth the effort.



Source link

Tags: AnalysisAppSecCompositiondeserveHeroSoftware
ShareTweetShare
Previous Post

15 Counties With the Most Housing Growth in the Past 10 Years

Next Post

National Streaming Day Offers You Can Score {Just in Time for Summer Break!}

Related Posts

edit post
1 Stock to Buy, 1 Stock to Sell This Week: Nike, Micron

1 Stock to Buy, 1 Stock to Sell This Week: Nike, Micron

by TheAdviserMagazine
December 14, 2025
0

Delayed U.S. jobs report, CPI inflation data, retail sales will be in focus this week. Nike has a credible shot...

edit post
GenAI Is Pushing Digital Transformation Into A No-Blueprint Phase

GenAI Is Pushing Digital Transformation Into A No-Blueprint Phase

by TheAdviserMagazine
December 12, 2025
0

For over a decade, digital transformation was mainly focused on “speed to blueprint.” Service providers offered deep catalogs of mature,...

edit post
2 AI Growth Stocks Poised for a Year-End Santa Rally

2 AI Growth Stocks Poised for a Year-End Santa Rally

by TheAdviserMagazine
December 12, 2025
0

As 2025 winds down, investors are keen to position themselves for the traditional "Santa Rally," when markets often see a...

edit post
Bitcoin: Trend Retest Approaches – Holding K Pivot Keeps Recovery Hopes Alive

Bitcoin: Trend Retest Approaches – Holding $91K Pivot Keeps Recovery Hopes Alive

by TheAdviserMagazine
December 12, 2025
0

entered December with sharp swings, slipped in the early days as investors moved away from risk, then bounced from the...

edit post
Psychological Safety Enables Opportunity Ecosystems Amid AI Transformation

Psychological Safety Enables Opportunity Ecosystems Amid AI Transformation

by TheAdviserMagazine
December 11, 2025
0

Curiosity is the basis for learning and innovation. But when employees don’t feel safe, they hesitate to ask questions —...

edit post
9 Financial Fortresses Poised to Deliver Durable Returns in the Months Ahead

9 Financial Fortresses Poised to Deliver Durable Returns in the Months Ahead

by TheAdviserMagazine
December 11, 2025
0

The Fed cut by 0.25% yesterday, helping US stocks rise. The FOMC also announced a Treasury bond-buying program, but Fed...

Next Post
edit post
National Streaming Day Offers You Can Score {Just in Time for Summer Break!}

National Streaming Day Offers You Can Score {Just in Time for Summer Break!}

edit post
How does a U.S.-dollar TFSA work?

How does a U.S.-dollar TFSA work?

  • Trending
  • Comments
  • Latest
edit post
How Long is a Last Will and Testament Valid in North Carolina?

How Long is a Last Will and Testament Valid in North Carolina?

December 8, 2025
edit post
How to Make a Valid Will in North Carolina

How to Make a Valid Will in North Carolina

November 20, 2025
edit post
In an Ohio Suburb, Sprawl Is Being Transformed Into Walkable Neighborhoods

In an Ohio Suburb, Sprawl Is Being Transformed Into Walkable Neighborhoods

December 14, 2025
edit post
Who Should I Choose as My Powers of Attorney?

Who Should I Choose as My Powers of Attorney?

December 6, 2025
edit post
8 Places To Get A Free Turkey for Thanksgiving

8 Places To Get A Free Turkey for Thanksgiving

November 21, 2025
edit post
Could He Face Even More Charges Under California Law?

Could He Face Even More Charges Under California Law?

November 27, 2025
edit post
Market Concentration and Lost Decades

Market Concentration and Lost Decades

0
edit post
Holland America Eurodam: Alaska Cruise Review

Holland America Eurodam: Alaska Cruise Review

0
edit post
Supply chain diversification away from China is progressing from talks to action, EU chamber says

Supply chain diversification away from China is progressing from talks to action, EU chamber says

0
edit post
Democrats Insist On Taxing Tips        

Democrats Insist On Taxing Tips        

0
edit post
Who decides if China will build the Metro?

Who decides if China will build the Metro?

0
edit post
Digital assets have vanished from government “vulnerability” list, officially ending a three-year regulatory chokehold on US banks

Digital assets have vanished from government “vulnerability” list, officially ending a three-year regulatory chokehold on US banks

0
edit post
Digital assets have vanished from government “vulnerability” list, officially ending a three-year regulatory chokehold on US banks

Digital assets have vanished from government “vulnerability” list, officially ending a three-year regulatory chokehold on US banks

December 15, 2025
edit post
Who decides if China will build the Metro?

Who decides if China will build the Metro?

December 15, 2025
edit post
Short-term volatility persists, but India’s long-term market outlook remains strong: Anshul Saigal

Short-term volatility persists, but India’s long-term market outlook remains strong: Anshul Saigal

December 15, 2025
edit post
How to protect yourself from identity fraud in Canada

How to protect yourself from identity fraud in Canada

December 15, 2025
edit post
10 things lower middle class people do to stretch every dollar — and why they’re actually genius

10 things lower middle class people do to stretch every dollar — and why they’re actually genius

December 15, 2025
edit post
Democrats Insist On Taxing Tips        

Democrats Insist On Taxing Tips        

December 15, 2025
The Adviser Magazine

The first and only national digital and print magazine that connects individuals, families, and businesses to Fee-Only financial advisers, accountants, attorneys and college guidance counselors.

CATEGORIES

  • 401k Plans
  • Business
  • College
  • Cryptocurrency
  • Economy
  • Estate Plans
  • Financial Planning
  • Investing
  • IRS & Taxes
  • Legal
  • Market Analysis
  • Markets
  • Medicare
  • Money
  • Personal Finance
  • Social Security
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • Digital assets have vanished from government “vulnerability” list, officially ending a three-year regulatory chokehold on US banks
  • Who decides if China will build the Metro?
  • Short-term volatility persists, but India’s long-term market outlook remains strong: Anshul Saigal
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclosures
  • Contact us
  • About Us

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.