Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SBOM

Harmonizing the Federal Effort on Automating Software Bill of Materials

When the Biden administration released Executive Order 14028, “Improving the Nation's Cybersecurity”, it included guidance to enhance the security of the nation’s software supply chain. As a result, key building blocks are being developed to both strengthen software security and bolster software Supply Chain Risk Management (SCRM) programs across the Federal government.

Report: The Role of the SBOM in Securing the Software Supply Chain

The software supply chain is under attack, and never has it been more critical to secure it. In doing so, organizations will lessen the risk of a hacker’s ability to gain unauthorized access to development environments and infrastructure. This can include version control systems, artifact registries, open-source repositories, continuous integration pipelines, build servers, or application servers.

SBOM 101 - All the questions you were afraid to ask Software Bill of Materials

During many recent security incidents, we hear a lot of messages about the lack of knowledge of the code dependencies, attacks to the software supply chain, Software Bill of Materials (SBOM), digital signatures, provenance, attestation, etc. The fact is, every time a new vulnerability appears in the landscape, we usually need to spend a lot of time and effort to detect the real impact on the applications and services that are running in our environment.

Is the SBOM Part of Your Software Security Lifecycle?

The software bill of materials (SBOM) is becoming an increasingly important element in the software development lifecycle (SDLC). In fact, given the rising threats based on software vulnerabilities and the growing use of applications to run or support all kinds of business processes, any organization that’s not using SBOMs is putting itself at real risk. An SBOM is an extensive list of all the components contained in a given software product.

Mend API Helps Make SBOMs Simple

The proliferation of third-party software components such as open source software(OSS) has triggered a growing need to keep track of it all. Why? Because when security vulnerabilities inevitably crop up in open source components, it’s pretty important to know whether your company uses that piece of code – or whether it appears in the myriad software dependencies inherent in open source.

AppSec Decoded: Methods and tools for SBOM generation | Synopsys

President Biden’s executive order calls for agencies to buy only software products that have a software Bill of Materials (SBOM). Mike McGuire, security solutions manager at Synopsys, and Taylor Armerding, security advocate at Synopsys, discuss the role SBOMs will play in application security and what tools and methods organizations can leverage to create a comprehensive SBOM.

Securing Your Software Supply Chain Requires a Dynamic SBOM

Concern is growing over the rise in software supply chain attacks and the need to develop better risk management policies. The software attack surface continues to grow, which in turn, increases risk. Recent high-profile attacks impacting companies including SolarWinds and Kaseya illustrate how vulnerable the software supply chain is today.

A Modern Security Environment Requires An SBOM

Organizations with legacy environments should be focused on reducing technical debt, which can expose businesses to exploits. In a recent article published by Forbes, Rezilion Co-Founder and CEO, Liran Tancman, discusses how restructuring organizations to better integrate tools such as SBOMs (Software Bills of Material) is a necessary step for the future. The use of such assets allows companies to reduce their workload by identifying the what matters in their software and eliminate unnecessary code.

RKVST (Jitsuin) SCITT Demo from 2019

Supply Chain Integrity, Transparency, and Trust... all in one platform. A little throw-back here...all the way to 2019! SCITT is a hot area right now in 2022 but this is what we've been doing since the beginning. We were even still called Jitsuin :-) This is a very quick run through how making supply chain evidence available to all authorised partners in a supply chain as quickly as possible with Provenance, Governance, and Immutability guarantees can boost trust, reduce risk, and speed operations.