YoVDO

What's in a Name - Vulnerabilities, SBOMs, and the Challenge of Software Identity

Offered By: Linux Foundation via YouTube

Tags

Software Supply Chain Security Courses Cybersecurity Courses Risk Assessment Courses Vulnerability Management Courses Open Source Courses Software Bill of Materials Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical issue of software identification in the context of supply chain security in this 45-minute conference talk by Justin Murphy from the Department of Homeland Security (DHS), Cybersecurity & Infrastructure Security Agency (CISA). Delve into the challenges posed by multiple naming standards and the gaps between them as the software world and US government aim for automation in mapping dependencies to known vulnerabilities. Examine existing solutions such as CPE, PURL, device identifiers, and hashes, while considering potential risks. Gain insights into collaborative approaches to address this problem over time and learn how the open source community can contribute to improving software identity management for enhanced supply chain security.

Syllabus

What’s in a Name? Vulnerabilities, SBOMs, and the Challenge of Software Identity - Justin Murphy


Taught by

Linux Foundation

Tags

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network