# Blogs

OpenText Core SCA blog serves as a knowledge hub focused on open-source security, software supply chain management, and vulnerability intelligence. Through its blog, OpenText Core SCA shares expert insights, research findings, product updates, and best practices that help developers, security professionals, and organizations manage the risks associated with open-source software.

The articles often explore key topics such as software composition analysis (SCA), supply chain attacks, open-source dependency management, and the evolving landscape of cybersecurity in software development. In addition, OpenText Core SCA blog highlights industry trends, customer success stories, and collaborative initiatives within the open-source community.

Here is the complete list of blogs published on the website:

<table data-view="cards"><thead><tr><th></th></tr></thead><tbody><tr><td><a href="blogs/copyright-and-open-source-licenses-part1-what-is-copyright">Copyright and open-source licenses part1: what is copyright?</a></td></tr><tr><td><a href="blogs/oss-licenses-part-2-inside-open-source-software-license-page">OSS licenses part 2: inside open- source software license page</a></td></tr><tr><td><a href="blogs/oss-licenses-part-3-permissive-licenses">OSS licenses part 3: permissive licenses</a></td></tr><tr><td><a href="blogs/oss-licenses-part-4-strong-copyleft-licenses">OSS licenses part 4: strong copyleft licenses</a></td></tr><tr><td><a href="blogs/oss-licenses-part-5-weak-copyleft-licenses">OSS licenses part 5: Weak copyleft licenses</a></td></tr><tr><td><a href="blogs/oss-licenses-part-6-license-compatibility-and-dual-licensing">OSS licenses part 6: license compatibility and dual licensing</a></td></tr><tr><td><a href="blogs/oss-licenses-part-7-other-licenses">OSS licenses part 7: other licenses</a></td></tr><tr><td><a href="blogs/cvss-precedence-in-nvd-and-opentext-core-sca">CVSS precedence in NVD and OpenText Core SCA</a></td></tr><tr><td><a href="blogs/the-software-bill-of-materials-part-1-benefitting-from-the-sbom">The Software Bill of Materials, part 1: benefitting from the SBOM</a></td></tr><tr><td><a href="blogs/the-software-bill-of-materials-part-2-drivers-motivators-and-challenges">The Software Bill of Materials, part 2: drivers, motivators, and challenges</a></td></tr><tr><td><a href="blogs/the-software-bill-of-materials-part-3-sbom-file">The Software Bill of Materials, part 3: SBOM file</a></td></tr><tr><td><a href="blogs/the-software-bill-of-materials-part-4-sbom-with-opentext-core-sca">The Software Bill of Materials, part 4: SBOM with OpenText Core SCA</a></td></tr><tr><td><a href="blogs/software-supply-chain-attacks-part-1-defining-and-understanding-the-attack">Software supply chain attacks, part 1: defining and understanding the attack</a></td></tr><tr><td><a href="blogs/software-supply-chain-attacks-part-2-open-source-software">Software supply chain attacks, part 2: open-source software</a></td></tr><tr><td><a href="blogs/software-supply-chain-attacks-part-3-role-of-software-composition-analysis">Software supply chain attacks, part 3: role of software composition analysis</a></td></tr><tr><td><a href="blogs/software-supply-chain-attacks-part-4-initiatives-to-support-mitigations">Software supply chain attacks, part 4: initiatives to support mitigations</a></td></tr><tr><td><a href="blogs/what-is-a-security-vulnerability-security-vulnerability-definition">What is a security vulnerability?: security vulnerability definition</a></td></tr><tr><td><a href="blogs/comply-with-sbom-requirements-of-the-new-cybersecurity-executive-order">Comply with SBOM requirements of the new Cybersecurity Executive Order</a></td></tr><tr><td><a href="blogs/why-shift-left-when-you-can-start-left-introducing-start-left-policies">Why shift left when you can start left?: introducing start left policies</a></td></tr><tr><td><a href="blogs/what-is-open-source-health">What is open-source health?</a></td></tr></tbody></table>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.debricked.com/opentext-core-sca-blogs/blogs.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
