Protective shield with a keyhole and stars

Quickstart: CRA (Cyber Resilience Act)

What is Cyber Resilience Act?   The European Cyber Resilience Act (CRA) aims to set the boundary conditions for the...

Red shield with keyhole and stars

Know Your Systems: DORA forces you to!

Open source in focus: Dora, vulnerabilities and the security of the software supply chain In a world where open source...

Protective shield with a keyhole and stars

Quickstart: DORA (Digital Operational Resilience Act)

  What is DORA? DORA stands for Digital Operational Resilience Act. DORA is EU regulation aiming at financial institutions which...

13 Things Auto Manufacturers Should Do to Manage Open Source License Compliance

13 Things Auto Manufacturers Should Do to Manage Open Source License Compliance

Open source software (OSS) is driving the automobile industry into the future. Automakers are looking to the advancement of integrated...

Tart with 10 candles

Bitsea celebrates its 10th anniversary

A decade of progress and success On December 21st, 2013, we proudly held the “birth certificate”, the business registration, of...

Artificial Intelligence Sued for Open Source Piracy

Copilot, an artificial intelligence-based system for automatically generating source code, has just been sued for $9 billion in damages for...

Open_Source_Monitor_Study_Report_2023

Open Source Monitor 2023

Bitkom has just published the brand new Bitkom Open Source Monitor 2023. Bitkom is the digital association in Germany; its...

ascending_arrow

Open Source Compliance? But more efficient, please!

Open Source Software (OSS) is everywhere and has become indispensable for modern software development. A typical software product today often...

Compliance & security: Limits of Open Source freedom

Compliance & security: Limits of Open Source freedom

Developing software is a bit like playing LEGO: You assemble thousands of Open Source (OSS) components into a new product....

VDR and VEX blocks are pushed by two men in one block

Level Up Your Security Game with VDR and VEX Reports

When we talk about security related to the software supply chain and third-party software management, it’s key that the tools...