Security | Threat Detection | Cyberattacks | DevSecOps | Compliance



Unlocking Supply Chain Transparency for Low-Code/No-Code Apps with SBOM

The world of software development has witnessed a significant transformation thanks to low-code/no-code development platforms like Microsoft Power Platform, Salesforce, and ServiceNow. These platforms have empowered developers and business users of all technical backgrounds to create applications, automations, bots, connections (and more), rapidly and with greater accessibility.


Bill of Materials (BOM) Meaning, Purpose, and Types

Imagine constructing a building without a blueprint or cooking a complex recipe without a list of ingredients. It would be a chaotic and inefficient process, right? The same principle applies to manufacturing and production. That's where the Bill of Materials (BOM) comes into play. In this article, we will explore the meaning, purpose, and diverse types of BOMs, illustrating how they serve as the foundation for seamless production processes.


The Role of API Inventory in SBOM and Cyber Security

Creating a Software Bill of Materials (SBOM) is crucial to software supply chain security management. It helps fortify your software supply chain and reduces the likeliness of your software being exploited. But did you know there's a way to enhance your software's security further? Well, that's when API inventory comes into the picture. Including API inventory in your SBOM can make your software solution more resilient to cyberattacks.


Creating a better internet at IETF117

The other week in San Francisco at IETF117, a group of developers and subject matter experts gathered to do just that. The IETF mission is: “To make the internet work better by producing high quality, relevant technical documents that influence the way people design, use, and manage the internet.” This standards body is quite unique – anyone with the right passion can join. Believe it or not, humming is a measure of consensus.


How to Make SBOMs Work for Incident Response

In a world where software tools are spawning businesses each day, and cyberattacks and threats are increasing rapidly, ensuring the clarity and security of these tools has become a top priority. Regulators suggest new tools and standards to ease the complexities in a software supply chain. One such tool is the Software Bill of Materials (SBOM). It lists all the components used in building the software and helps identify the weak spots.


C2PA, external manifests, and expanding content provenance

Last month, Adobe’s Chief Trust Officer Dana Rao testified to Congress about the importance of content provenance, encouraging Congress to require platforms to maintain proof of origin for content, ensuring that “attributions are not stripped away, and artists can receive credit for their work.” Following Rao’s testimony, Google, Microsoft, Amazon, and other AI leaders met at the White House to voluntarily agree to “ Develop and deploy mechanisms that enable users to under


SBOMs and Security: What DevSecOps Teams Need To Know?

DevSecOps is an impeccable methodology that combines development, operations (DevOps), and security practices in the Software Development Lifecycle (SDLC). In this methodology, security comes into play from the beginning and is a shared responsibility instead of an afterthought. However, with the ever-evolving digital landscape, and continuous use of third-party and open-source components, DevSecOps teams need to fortify this methodology to minimize the risk and make their software more resilient.