YoVDO

What's in a Name - Vulnerabilities, SBOMs, and the Challenge of Software Identity

Offered By: Linux Foundation via YouTube

Tags

Software Supply Chain Security Courses Cybersecurity Courses Risk Assessment Courses Vulnerability Management Courses Open Source Courses Software Bill of Materials Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical issue of software identification in the context of supply chain security in this 45-minute conference talk by Justin Murphy from the Department of Homeland Security (DHS), Cybersecurity & Infrastructure Security Agency (CISA). Delve into the challenges posed by multiple naming standards and the gaps between them as the software world and US government aim for automation in mapping dependencies to known vulnerabilities. Examine existing solutions such as CPE, PURL, device identifiers, and hashes, while considering potential risks. Gain insights into collaborative approaches to address this problem over time and learn how the open source community can contribute to improving software identity management for enhanced supply chain security.

Syllabus

What’s in a Name? Vulnerabilities, SBOMs, and the Challenge of Software Identity - Justin Murphy


Taught by

Linux Foundation

Tags

Related Courses

The Foundations of Cybersecurity
University System of Georgia via Coursera
Introduction to Cybersecurity
SecurityScoreCard via Udacity
TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-003)
Udemy
Fundamentals of Internet Security | Secure Your Environment
Udemy
Ciberseguridad en linea
Udemy