The sbomify Blog
Content for software, product, and digital security experts
Get the latest SBOMs from the top 15 most popular images on Docker Hub
Most companies that use Docker also use Docker Hub in some capacity. Have you ever wondered how secure these images are? In our article...
Comprehensive Guide to Generating and Understanding SBOMs with Docker and Django-CMS
It’s fair to say that SBOMs (Software Bill of Materials) is a rapidly emerging field. Many vendors, like Docker and GitHub, now offer...
Call for Views on the Code of Practice for Software Vendors: Ensuring Security and Resilience
The UK government has launched a call for views on a new voluntary Code of Practice for Software Vendors. This initiative aims to enhance...
Enhancing SBOM Sharing: A Look at Current Practices and the Role of sbomify
Software Bill of Materials (SBOM) sharing is becoming increasingly vital in our interconnected digital ecosystem, where security and...
Understanding ISO 42001 and the Integration of SBOMs for Enhanced Operational Resilience
Introduction to ISO 42001 In an era marked by rapid technological advances and complex interdependencies, businesses increasingly prioritize...
Harnessing ISO 27001 and SBOMs for Enhanced Information Security Management
Introduction to ISO 27001 As businesses navigate the complex landscape of cyber threats, ISO 27001 emerges as a vital standard for...
Exploring the New SPDX 3.0: A Game Changer for SBOMs
TL;DR: SPDX 3.0 is the latest update to the Software Package Data Exchange standard, significantly enhancing the way Software Bill of...
What Is OpenSSF? Scorecards, SLSA, and the Open Source Security Ecosystem
After the Log4Shell vulnerability exposed how a single widely-used open source library could affect hundreds of thousands of organizations,...
How SBOMs Streamline SOC 2 Compliance: Insights for the Agile Enterprise
Decoding SOC 2 Compliance for Agile Enterprises For agile enterprises aiming to assure clients that their data is in safe hands, SOC 2...
What really happened to XZ?
The article “XZ Backdoor Story Part 1” from Securelist delves into the discovery and analysis of a backdoor found in XZ, which...
Elevate Your Cybersecurity with Our Leading SBOM Management Solution
In an era where digital security is paramount, the recent Executive Order 14028 on Improving the Nation’s Cybersecurity has set a new...
NIST Cybersecurity Framework (CSF) 2.0: What It Means for Software Supply Chain Security
In February 2024, the National Institute of Standards and Technology (NIST) released version 2.0 of the Cybersecurity Framework – the most...