Gå ubegrenset med Magzter GOLD

Gå ubegrenset med Magzter GOLD

Få ubegrenset tilgang til over 9000 magasiner, aviser og premiumhistorier for bare

$149.99
 
$74.99/År

Prøve GULL - Gratis

Want to Prevent a Cyber Attack? Prepare a Software Bill of Materials

Open Source For You

|

April 2023

A Software Bill of Materials (SBOM) lists all the open source and third-party components present in a codebase, and has been mandated in the US. It helps make software transparent and less vulnerable to attacks.

- Vinayak R. Adkoli

Want to Prevent a Cyber Attack? Prepare a Software Bill of Materials

Open source software security is always in the spotlight. Every time there is a cyber attack, a lot of time and effort is required to detect not just when, where and how it occurred, but also to measure the real impact on the applications and services that are running in digital environments. Recent cyber-attacks have highlighted the general lack of knowledge about code dependencies and attacks on the software supply chain.

A Software Bill of Materials (SBOM) helps organisations to meet new domestic and international cyber security requirement laws. Supply chains point out the relationships between the various components used in building software. These components include libraries and modules. They can be open source or proprietary, and free or paid.

Why are SBOMs needed?

An SBOM is a list of all the open source and thirdparty components present in a codebase. It also lists the licences that govern those components, the versions of the components used in the codebase, and their patch status. This helps security teams to quickly identify any associated security or licence risks.

An SBOM provides a machine readable list of components of the software and its dependencies. As it has become a key component for cloud security for private and government organisations, it is estimated that 88 per cent of organisations will use SBOMs by the end of 2023.

Similarly, smart organisations that build software maintain an accurate, up-to-date SBOM, which includes an inventory of third-party and open source components to ensure that their code is of high quality, compliant, and secure.

SBOMs and cyber security

FLERE HISTORIER FRA Open Source For You

Open Source For You

Open Source For You

Top 10 Open Source Tools for System and IT Administrators

All reputed online services have committed system and IT administrators working behind the scenes. Here are ten open source tools they should be aware of, as these can help them monitor, automate, as well as manage complex infrastructure with relative ease.

time to read

6 mins

February 2026

Open Source For You

Google opens access to its Gemini Deep Research Agent

Google has opened access to its Gemini Deep Research Agent for the first time, allowing developers to integrate advanced autonomous research capabilities directly into their applications.

time to read

1 min

February 2026

Open Source For You

Open Source For You

NVIDIA buys SchedMD, keeps Slurm open source and vendor neutral

NVIDIA has acquired AI software company SchedMD, signalling a deeper commitment to open source technologies as competition intensifies across the artificial intelligence ecosystem.

time to read

1 min

February 2026

Open Source For You

Open Source For You

How Open Source Tools Power Modern IT Operations

Open source tools have not replaced enterprise IT platforms; they have become the connective layer that makes modern operations possible.

time to read

6 mins

February 2026

Open Source For You

Mandiant's Auralnspector enhances Salesforce security

Google-owned cybersecurity firm Mandiant has released AuraInspector, a free, open source command-line tool designed to identify dangerous access control misconfigurations in Salesforce environments, marking a significant move to democratise enterprise-grade security testing.

time to read

1 min

February 2026

Open Source For You

Google launches Universal Commerce Protocol to power agentic AI commerce

Google has introduced the Universal Commerce Protocol (UCP), a new open standard that enables AI agents to autonomously perform end-to-end commerce activities, spanning product discovery, purchasing, checkout, payments, and postpurchase experiences.

time to read

1 min

February 2026

Open Source For You

Open Source For You

Zero Trust CI/CD: The Death of Static Secrets

In an era where data breach costs continue to hit record highs, shifting to a secretless CI/CD pipeline is the most effective step to safeguard digital infrastructure.

time to read

7 mins

February 2026

Open Source For You

Open Source For You

Quantum Algorithms: The Future of Computing

Explore the essence of quantum algorithms, their groundbreaking applications, recent innovations, and the challenges that remain.

time to read

8 mins

February 2026

Open Source For You

Open Source For You

Bringing Clarity to the Chaos in AI

AI feels powerful, yet most teams struggle because they cannot define what intelligence they really need. But there are ways to address this challenge.

time to read

5 mins

February 2026

Open Source For You

Open Source For You

Top researchers return to OpenAI

OpenAI has welcomed back three high-profile researchers, Barret Zoph, Luke Metz, and Sam Schoenholz, following their brief tenure at former OpenAI CTO Mira Murati's AI startup, Thinking Machines.

time to read

1 min

February 2026

Translate

Share

-
+

Change font size