YoVDO

What's in a Name - Vulnerabilities, SBOMs, and the Challenge of Software Identity

Offered By: Linux Foundation via YouTube

Tags

Software Supply Chain Security Courses Cybersecurity Courses Risk Assessment Courses Vulnerability Management Courses Open Source Courses Software Bill of Materials Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical issue of software identification in the context of supply chain security in this 45-minute conference talk by Justin Murphy from the Department of Homeland Security (DHS), Cybersecurity & Infrastructure Security Agency (CISA). Delve into the challenges posed by multiple naming standards and the gaps between them as the software world and US government aim for automation in mapping dependencies to known vulnerabilities. Examine existing solutions such as CPE, PURL, device identifiers, and hashes, while considering potential risks. Gain insights into collaborative approaches to address this problem over time and learn how the open source community can contribute to improving software identity management for enhanced supply chain security.

Syllabus

What’s in a Name? Vulnerabilities, SBOMs, and the Challenge of Software Identity - Justin Murphy


Taught by

Linux Foundation

Tags

Related Courses

The A's, B's, and Four C's of Testing Cloud-Native Applications
LASCON via YouTube
A Different Kind of S3 - First Line Security of the Supply Chain
Linux Foundation via YouTube
Accountability Taxonomy for AI Software Bill of Materials
Linux Foundation via YouTube
Activities in Japan and 10 Streams of OSS Security Mobilization Plan
OpenSSF via YouTube
Addressing Security Issues Before Production with Docker Scout
Docker via YouTube