<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: Software Composite Analysis (SCA): How secured are the dependencies?	</title>
	<atom:link href="https://codenteam.com/software-composite-analysis-sca-how-secured-are-the-dependencies/feed/" rel="self" type="application/rss+xml" />
	<link>https://codenteam.com/software-composite-analysis-sca-how-secured-are-the-dependencies/</link>
	<description>The AI Diagnostic Lab for Tech Teams</description>
	<lastBuildDate>Fri, 21 Mar 2025 23:29:04 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>
		By: SCA vs SAST: Understanding Key Application Security Testing Methods - Codenteam		</title>
		<link>https://codenteam.com/software-composite-analysis-sca-how-secured-are-the-dependencies/#comment-45</link>

		<dc:creator><![CDATA[SCA vs SAST: Understanding Key Application Security Testing Methods - Codenteam]]></dc:creator>
		<pubDate>Fri, 21 Mar 2025 23:29:04 +0000</pubDate>
		<guid isPermaLink="false">https://codenteam.com/?p=238270#comment-45</guid>

					<description><![CDATA[[&#8230;] tools to identify and mitigate security risks. Two essential approaches in the AppSec toolkit are Software Composition Analysis (SCA) and Static Application Security Testing (SAST). While both aim to strengthen application security, [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] tools to identify and mitigate security risks. Two essential approaches in the AppSec toolkit are Software Composition Analysis (SCA) and Static Application Security Testing (SAST). While both aim to strengthen application security, [&#8230;]</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
