all InfoSec news
An Open Source Maintainer’s Best Practice: How to Use SBOMs to Root Out Project Vulnerabilities
Oct. 25, 2022, 8:25 p.m. | alinskens@sonatype.com (Aaron Linskens)
Sonatype Blog blog.sonatype.com
Sonatype has partnered with the Cloud Native Computing Foundation (CNCF) for Security Slam, an event to help improve the security of open source projects. To extend the value of this event, we created a series of blog posts on best practices for open source maintainers.
Here in the second post of our series, we explore how your project can benefit from the use of a software bill of materials (SBOM).
best practice devzone events and webinars open source open source best practices practice project root vulnerabilities
More from blog.sonatype.com / Sonatype Blog
The essential duo of SCA and SBOM management
6 days, 17 hours ago |
blog.sonatype.com
Automating and maintaining SBOMs
1 week, 6 days ago |
blog.sonatype.com
Cyber readiness and SBOMs
3 weeks, 2 days ago |
blog.sonatype.com
Open source ML/AI models: attackers' next target
3 weeks, 6 days ago |
blog.sonatype.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Dir-Information Security - Cyber Analytics
@ Marriott International | Bethesda, MD, United States
Security Engineer - Security Operations
@ TravelPerk | Barcelona, Barcelona, Spain
Information Security Mgmt- Risk Assessor
@ JPMorgan Chase & Co. | Bengaluru, Karnataka, India
SAP CO Consultant
@ Atos | Istanbul, TR