The CISA planning to release a white paper on software identity this week at their “SBOM-a-Rama” as part of an effort to understand vulnerabilities.
Joe Saunders, CEO, RunSafe Security had this comment:
Identifying vulnerabilities in software begins with identifying what’s in your software. We look forward to contributing our approaches on these matters because with the collective input we can develop a way to dramatically reduce the attack surface and develop ways to dramatically change the economics of cyber attack back in favor of the defenders. This is a unifying opportunity for the entire industry.
Everything that we all do in terms of identifying vulnerabilities in software and addressing them is a good thing. The reason is that it takes away one avenue for the bad guys to pwn you or your environment.
Like this:
Like Loading...
Related
This entry was posted on June 12, 2023 at 2:15 pm and is filed under Commentary with tags CISA. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
CISA Plans To Release White Paper On Software Identity
The CISA planning to release a white paper on software identity this week at their “SBOM-a-Rama” as part of an effort to understand vulnerabilities.
Joe Saunders, CEO, RunSafe Security had this comment:
Identifying vulnerabilities in software begins with identifying what’s in your software. We look forward to contributing our approaches on these matters because with the collective input we can develop a way to dramatically reduce the attack surface and develop ways to dramatically change the economics of cyber attack back in favor of the defenders. This is a unifying opportunity for the entire industry.
Everything that we all do in terms of identifying vulnerabilities in software and addressing them is a good thing. The reason is that it takes away one avenue for the bad guys to pwn you or your environment.
Share this:
Like this:
Related
This entry was posted on June 12, 2023 at 2:15 pm and is filed under Commentary with tags CISA. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.