Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SBOM

SBOM to Improve Software Supply Chain Security

As software systems become more intricate and the use of third-party components increases, the security risks within the software supply chain also escalate. To combat these risks, organizations are turning to the Software Bill of Materials (SBOM) as a valuable tool. This blog will guide you through the concept of SBOM and its impact on software supply chain security.

Cloud Security Lounge: Vulnerability Management the SBOM Way

Vulnerability Management always starts from… a list of vulnerabilities. But where does this list come from? How do you know what software an organization is using? SBOM is a way to describe all this. It’s a data model, a format, used by a broad ecosystem helping manage vulnerabilities and more.

Five Tips for Using SBOMs to Boost Supply Chain Security

A Software Bill of Materials (SBOM) is a key cyber defense item — it identifies what’s in your software, applications, and code base so that you can detect and mitigate risk more effectively. This is useful when it comes to application security because companies can only detect and fix vulnerabilities if they know what’s there in the first place. SBOMs give you that visibility. Consequently, SBOMs are now a “must-have” tool for most companies.

FDA: SBOMs requirement for connected medical devices

With FDA requirements mandating a cybersecurity bill of materials (CBOM) for medical devices, consider partnering with a trusted SBOM solution provider. In today’s world of Internet of Things (IoT), the possibility for connection is endless: cars, watches, light bulbs, HVAC, refrigerators—even humans and the devices monitoring and controlling their health can be connected.

How Are SBOMs Shared? New Findings From A CISA SBOM Survey

In a post published earlier. this week, we delved into the sharing lifecycle phases of a Software Bill of Materials (SBOM) from a report the Cybersecurity and Infrastructure Security Agency (CISA) recently released. Included within the report was a survey on the current state of SBOM sharing among stakeholders, in which 21 organizations provided responses on their approaches.

Stop Today's Emerging Endpoint Risks: Announcing Tanium SBOM for Comply, Expanded ARM Support, and Risk & Compliance Updates

Our most recent product and feature release further secures software supply chains, extends Tanium’s single view of endpoint data to additional ARM-powered devices, and expands the capabilities of our Risk & Compliance solution.

What to Know About the CISA Software Bill of Materials Sharing Lifecycle Phases

As Software Bill of Materials (SBOM) adoption efforts mature, a report recently released by the Cybersecurity and Infrastructure Security Agency (CISA) provides guidance to users in selecting suitable SBOM sharing platforms based on the amount of time, resources, subject-matter expertise, effort, and access to tooling available to them to implement a phase of the SBOM sharing lifecycle. The lifecycle has three phases: discovery, access, and transport.

What Are SBOMs? Software Bill of Materials for Secure Software Supply Chains

Vendors have long used bills of materials to detail the pieces that make up their supply chain products. Software bill of materials (SBOM) is a similar but traditionally less critical development in IT. However, that is quickly changing: companies are concerned about the security of their purchases, especially as applications become more expensive and sophisticated.