# Blogs

OpenText Core SCA blog serves as a knowledge hub focused on open-source security, software supply chain management, and vulnerability intelligence. Through its blog, OpenText Core SCA shares expert insights, research findings, product updates, and best practices that help developers, security professionals, and organizations manage the risks associated with open-source software.

The articles often explore key topics such as software composition analysis (SCA), supply chain attacks, open-source dependency management, and the evolving landscape of cybersecurity in software development. In addition, OpenText Core SCA blog highlights industry trends, customer success stories, and collaborative initiatives within the open-source community.

Here is the complete list of blogs published on the website:

<table data-view="cards"><thead><tr><th></th></tr></thead><tbody><tr><td><a href="blogs/copyright-and-open-source-licenses-part1-what-is-copyright">Copyright and open-source licenses part1: what is copyright?</a></td></tr><tr><td><a href="blogs/oss-licenses-part-2-inside-open-source-software-license-page">OSS licenses part 2: inside open- source software license page</a></td></tr><tr><td><a href="blogs/oss-licenses-part-3-permissive-licenses">OSS licenses part 3: permissive licenses</a></td></tr><tr><td><a href="blogs/oss-licenses-part-4-strong-copyleft-licenses">OSS licenses part 4: strong copyleft licenses</a></td></tr><tr><td><a href="blogs/oss-licenses-part-5-weak-copyleft-licenses">OSS licenses part 5: Weak copyleft licenses</a></td></tr><tr><td><a href="blogs/oss-licenses-part-6-license-compatibility-and-dual-licensing">OSS licenses part 6: license compatibility and dual licensing</a></td></tr><tr><td><a href="blogs/oss-licenses-part-7-other-licenses">OSS licenses part 7: other licenses</a></td></tr><tr><td><a href="blogs/cvss-precedence-in-nvd-and-opentext-core-sca">CVSS precedence in NVD and OpenText Core SCA</a></td></tr><tr><td><a href="blogs/the-software-bill-of-materials-part-1-benefitting-from-the-sbom">The Software Bill of Materials, part 1: benefitting from the SBOM</a></td></tr><tr><td><a href="blogs/the-software-bill-of-materials-part-2-drivers-motivators-and-challenges">The Software Bill of Materials, part 2: drivers, motivators, and challenges</a></td></tr><tr><td><a href="blogs/the-software-bill-of-materials-part-3-sbom-file">The Software Bill of Materials, part 3: SBOM file</a></td></tr><tr><td><a href="blogs/the-software-bill-of-materials-part-4-sbom-with-opentext-core-sca">The Software Bill of Materials, part 4: SBOM with OpenText Core SCA</a></td></tr><tr><td><a href="blogs/software-supply-chain-attacks-part-1-defining-and-understanding-the-attack">Software supply chain attacks, part 1: defining and understanding the attack</a></td></tr><tr><td><a href="blogs/software-supply-chain-attacks-part-2-open-source-software">Software supply chain attacks, part 2: open-source software</a></td></tr><tr><td><a href="blogs/software-supply-chain-attacks-part-3-role-of-software-composition-analysis">Software supply chain attacks, part 3: role of software composition analysis</a></td></tr><tr><td><a href="blogs/software-supply-chain-attacks-part-4-initiatives-to-support-mitigations">Software supply chain attacks, part 4: initiatives to support mitigations</a></td></tr><tr><td><a href="blogs/what-is-a-security-vulnerability-security-vulnerability-definition">What is a security vulnerability?: security vulnerability definition</a></td></tr><tr><td><a href="blogs/comply-with-sbom-requirements-of-the-new-cybersecurity-executive-order">Comply with SBOM requirements of the new Cybersecurity Executive Order</a></td></tr><tr><td><a href="blogs/why-shift-left-when-you-can-start-left-introducing-start-left-policies">Why shift left when you can start left?: introducing start left policies</a></td></tr><tr><td><a href="blogs/what-is-open-source-health">What is open-source health?</a></td></tr></tbody></table>
