Tag: sbom
-
CISA updates SBOM recommendations
The document is primarily meant for federal agencies, but CISA hopes businesses will also use it to push vendors for software bills of materials. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-sbom-software-bill-of-materials-guidance-update/758414/
-
Wie CISOs von der Blockchain profitieren
Tags: access, ai, api, blockchain, ciso, compliance, framework, governance, identity, LLM, network, saas, sbom, software, tool, zero-trustDie Blockchain macht Trust verifizierbar.Sicherheitsvorfälle gehen nicht nur auf eine Kompromittierung der internen Systeme zurück. Sie hängen regelmäßig auch damit zusammen, dass:Privileged-Access-Protokolle fehlen,SaaS-Audit-Trails nicht vertrauenswürdig sind, oderLieferketten kompromittiert werden.Die Blockchain kann dabei helfen, diese realen Probleme zu lösen und Manipulationssicherheit, Datenintegrität und Trust zu gewährleisten. Im Kern ist Blockchain ein System von Datensätzen, die über…
-
What Is A Software Bill of Materials (SBOM) 4 Critical Benefits
Learn how SBOMs improve transparency, security, and compliance. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/08/what-is-a-software-bill-of-materials-sbom-4-critical-benefits/
-
AIBOMs are the new SBOMs: The missing link in AI risk management
In this Help Net Security interview, Marc Frankel, CEO at Manifest Cyber, discusses how overlooked AI-specific risks, like poisoned training data and shadow AI, can lead to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/08/04/marc-frankel-manifest-cyber-aiboms-sboms/
-
SBOM für KI – BSI fordert Transparenz bei KI-Lieferketten
First seen on security-insider.de Jump to article: www.security-insider.de/bsi-fordert-transparenz-bei-ki-lieferketten-a-8a765fc72d1226d3e14f0a3e842a7519/
-
BSI führt G7-Initiative an: Erstes Konzept für ‘SBOM for AI” veröffentlicht
Transparenz als Grundpfeiler für sichere Künstliche Intelligenz: Im Rahmen des G7-Cybersicherheitsgipfels in Ottawa hat das Bundesamt für Sicherheit in der Informationstechnik (BSI) gemeinsam mit internationalen Partnern ein gemeinsames Konzept für eine ‘Software Bill of Materials” (SBOM) für KI-Systeme vorgestellt. Die Initiative soll künftig Klarheit über Modelle, Datenquellen und Risiken entlang des gesamten KI-Lebenszyklus schaffen. First…
-
Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security
As applications become more distributed, traditional monitoring and security tools are failing to keep pace. This article explores how eBPF, when utilized by the graduated … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/06/18/ebpf-cilium-tetragon-sboms-security/
-
SBOM for AI: BSI-geleitete G7-Arbeitsgruppe veröffentlicht gemeinsames Konzept
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/sbom-for-ai-bsi-leitung-g7-arbeitsgruppe-veroeffentlichung-konzept
-
BSidesLV24 Proving Ground Demystifying SBOMs: Strengthening Cybersecurity Defenses
Authors/Presenters: Krity Kharbanda, Harini Ramprasad Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/bsideslv24-proving-ground-demystifying-sboms-strengthening-cybersecurity-defenses/
-
Chase CISO condemns the security of the industry’s SaaS offerings
Tags: ai, api, ciso, cloud, control, crowdstrike, cybersecurity, data, defense, detection, group, identity, incident response, infrastructure, network, risk, saas, sbom, threatSolutions missing: Fritz Jean-Louis, principal cybersecurity advisor at Info-Tech Research Group, said that he generally agreed with the Chase description of the cybersecurity challenges today.”One of the key points in the letter is that the modern SaaS model concentrates sensitive data behind a handful of cloud front doors. JP Morgan itself has logged multiple third-party…
-
Secure by Design is likely dead at CISA. Will the private sector make good on its pledge?
Tags: cisa, cybersecurity, government, office, risk, risk-management, sbom, software, technology, toolCISA’s Secure by Design effort is ‘tiny’: Not everyone believes in the concept of security by design. Jeff Williams, founder and CTO of Contrast Security and creator of the first OWASP Top 10 list in 2002, told CSO that, in his view, the very first secure-by-design manual was the vaunted August 1983 “Orange Book” produced…
-
What is the xBOM?
Tags: cloud, cryptography, cyber, Hardware, international, resilience, risk, sbom, service, software, supply-chain, technology, tool -
AI development pipeline attacks expand CISOs’ software supply chain risk
Tags: access, ai, api, application-security, attack, backdoor, breach, business, ciso, cloud, container, control, cyber, cybersecurity, data, data-breach, detection, encryption, exploit, flaw, fortinet, government, infrastructure, injection, intelligence, LLM, malicious, malware, ml, network, open-source, password, penetration-testing, programming, pypi, risk, risk-assessment, russia, saas, sbom, service, software, supply-chain, threat, tool, training, vpn, vulnerabilitydevelopment pipelines are exacerbating software supply chain security problems.Incidents of exposed development secrets via publicly accessible, open-source packages rose 12% last year compared to 2023, according to ReversingLabs (RL).A scan of 30 of the most popular open-source packages found an average of six critical-severity and 33 high-severity flaws per package.Commercial software packages are also a…
-
Software Bill of Material umsetzen: Die besten SBOM-Tools
Tags: api, business, compliance, container, cyberattack, data, docker, gartner, github, gitlab, healthcare, linux, monitoring, open-source, risk, saas, sbom, service, software, tool, update, vulnerabilityNur wenn Sie wissen, was drinsteckt, können Sie sich sicher sein, dass alles mit rechten Dingen zugeht. Das gilt für Fast Food wie für Software. Um Software abzusichern, muss man wissen, was in ihrem Code steckt. Aus diesem Grund ist eine Software Bill of Material, SBOM oder Software-Stückliste heute unerlässlich. Der SolarWinds-Angriff sowie die Log4j-Schwachstelle…
-
Trump disbands Cyber Safety Review Board, Salt Typhoon inquiry in limbo
Tags: advisory, ai, attack, china, cisa, crowdstrike, cyber, cybersecurity, government, group, hacking, healthcare, incident, infrastructure, microsoft, network, ransomware, sbom, service, technology, threat, vulnerabilityThe administration of US President Donald Trump has dismissed all members of its Cyber Safety Review Board (CSRB), including those investigating the China-linked hacking group Salt Typhoon. Other groups affected by a general clear-out include the AI Safety and Security Board and the National Security Telecommunications Advisory Committee.Cybersecurity experts have expressed concern about the move,…
-
Trump administration disbands DHS board investigating Salt Typhoon hacks
Tags: advisory, ai, attack, china, cisa, crowdstrike, cyber, cybersecurity, government, group, hacking, healthcare, incident, infrastructure, microsoft, network, ransomware, sbom, service, technology, threat, vulnerabilityThe administration of US President Donald Trump has dismissed all members of its Cyber Safety Review Board (CSRB), including those investigating the China-linked hacking group Salt Typhoon. Other groups affected by a general clear-out include the AI Safety and Security Board and the National Security Telecommunications Advisory Committee.Cybersecurity experts have expressed concern about the move,…
-
DEF CON 32 SBOMs the Hard Way: Hacking Bob the Minion
Authors/Presenters: Larry Pesce Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-sboms-the-hard-way-hacking-bob-the-minion/
-
Die Software-Branche braucht Software Bills of Materials – Open Source kommt in Zukunft nicht ohne SBOM aus
First seen on security-insider.de Jump to article: www.security-insider.de/open-source-software-braucht-sbom-a-ab67253f08be1785db87d428f45a297e/

