Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SBOM

SBOM Explained: How SBOMs Improve Cloud-native Application Security

A staggering 96% of organizations utilize open-source libraries, yet fewer than 50% actively manage the security vulnerabilities within these libraries. Vulnerabilities are welcome mats for breaches from bad actors, and once they've entered your system, the impact can be colossal. A software bill of materials (SBOM) is an important tool for managing the security of open-source software.

Device Authority embraces transparency and international standards as the White House Names SBOMs as key pillar of Cybersecurity Implementation Plan

In a significant stride towards strengthening cybersecurity practices and protecting the nation’s digital future, the White House has issued a formal National Cybersecurity Implementation Plan, and named the 5 pillars that it believes are critical to successfully implementing its cybersecurity strategy.

Enhance SBOMs with runtime security context using Datadog Application Vulnerability Management

Software today relies heavily on open source, third-party components, but these reusable dependencies sometimes inadvertently introduce security vulnerabilities into the code of developers who use them. Some of the most serious vulnerabilities discovered in recent years—like the OpenSSL punycode vulnerability, Log4Shell (Log4j), and Dirty Pipe (Linux)—reside in popular open source packages, making them so widespread that they could compromise almost the entire software ecosystem.

SBOM to Improve Software Supply Chain Security

As software systems become more intricate and the use of third-party components increases, the security risks within the software supply chain also escalate. To combat these risks, organizations are turning to the Software Bill of Materials (SBOM) as a valuable tool. This blog will guide you through the concept of SBOM and its impact on software supply chain security.

Cloud Security Lounge: Vulnerability Management the SBOM Way

Vulnerability Management always starts from… a list of vulnerabilities. But where does this list come from? How do you know what software an organization is using? SBOM is a way to describe all this. It’s a data model, a format, used by a broad ecosystem helping manage vulnerabilities and more.

Five Tips for Using SBOMs to Boost Supply Chain Security

A Software Bill of Materials (SBOM) is a key cyber defense item — it identifies what’s in your software, applications, and code base so that you can detect and mitigate risk more effectively. This is useful when it comes to application security because companies can only detect and fix vulnerabilities if they know what’s there in the first place. SBOMs give you that visibility. Consequently, SBOMs are now a “must-have” tool for most companies.

FDA: SBOMs requirement for connected medical devices

With FDA requirements mandating a cybersecurity bill of materials (CBOM) for medical devices, consider partnering with a trusted SBOM solution provider. In today’s world of Internet of Things (IoT), the possibility for connection is endless: cars, watches, light bulbs, HVAC, refrigerators—even humans and the devices monitoring and controlling their health can be connected.

Stop Today's Emerging Endpoint Risks: Announcing Tanium SBOM for Comply, Expanded ARM Support, and Risk & Compliance Updates

Our most recent product and feature release further secures software supply chains, extends Tanium’s single view of endpoint data to additional ARM-powered devices, and expands the capabilities of our Risk & Compliance solution.