Will 2024 Be the Year of the Software Bill of Materials? Experts Weigh In.

The Software Bill of Materials has become a central part of the White House National Cyber Security Strategy to help protect the software supply chain supporting government and critical infrastructure systems.
Standards for expressing and consuming SBOM data are maturing, and the CISA has also published a thorough list of the types of SBOMs required to include the different development stages of the product lifecycle.
They should include detailed safety information about every code element and object that goes into a software product.
Experts predict that these ingredients will grow in 2024, particularly when it comes to AI-enabled safety-critical systems.
Experts also predict how changes in open-source licensing will impact SBOM maintenance and usage.
Given these complexities, some experts feel that SBOMs are losing traction as government agencies struggle to find software product vendors that meet requirements in this evolving landscape.
Open-source code is at the core of the vast majority of safety-critical software systems.
A month earlier, Red Hat announced changes in Red Hat Linux licensing and support that will render republishing code that was acquired through its customer portal in violation of new licensing agreements.
Developers will need SBOMs to track all their components, versions, and vulnerabilities to keep current on changes in open-source licensing, which must scale to include all interdependencies between components and third-party apps the product interacts with.
As more AI and machine learning elements are implemented in vehicles and other safety-critical systems, SBOMs will also need to integrate with different types of Bills of Materials where SBOMs are only a part of the safety data manufacturers and regulators require, says Kate Stewart, VP of embedded systems at the Linux Foundation.
She then pointed out that there are more ingredients in our vehicles than just software and hardware.
They also include AI training data, and communications to remote services, for example.
To date, combining this data has been a mostly manual effort, but the maturation of standards like SPDX are also encompassing more types of BOM data.
From a Linux perspective, she pointed to several working groups including Elisa, Zepher RTOS, Xen for Hypervisor, and yocto) to expand BOM data to include create/tool-chain data, AI training data, and testing data, for example.
How the data from all these BOMs will come together, even with these working groups and standards, will take time and effort.
SBOMs will continue to struggle with scalability and relevancy issues that will slow SBOM adoption, predicts Chris Hughes, president of government security services firm, Aquia, and cyber innovation fellow at the CISA, where he focuses on software supply chain security.
He adds that less than six percent of CVE's are exploited, and predicts that SBOMs will include exploitability scores by aligning with resources like the CISA's Known Exploited Vulnerabilities Catalog and the Exploit Prediction Scoring System.
Focusing on exploitability, he adds, should provide context and reduce the noise of too many vulnerabilities, helping product developers and product buyers focus only on those vulnerabilities that matter.
That said, much work has been done to automate SBOM generation, while intermediaries have sprung up to manage and keep them current.
The more mature intermediaries are already helping users of the SBOMs prioritize vulnerability remediation based on KEV and other vulnerability scoring exchanges.


This Cyber News was published on securityboulevard.com. Publication date: Fri, 15 Dec 2023 16:13:04 +0000


Cyber News related to Will 2024 Be the Year of the Software Bill of Materials? Experts Weigh In.

5 Questions to Ask Before Backing the TikTok Ban - With strong bipartisan support, the U.S. House voted 352 to 65 to pass HR 7521 this week, a bill that would ban TikTok nationwide if its Chinese owner doesn't sell the popular video app. The TikTok bill's future in the U.S. Senate isn't yet clear, ...
8 months ago Eff.org
Will 2024 Be the Year of the Software Bill of Materials? Experts Weigh In. - The Software Bill of Materials has become a central part of the White House National Cyber Security Strategy to help protect the software supply chain supporting government and critical infrastructure systems. Standards for expressing and consuming ...
11 months ago Securityboulevard.com
Calif. Gov. Vetoes AI Safety Bill Aimed at Big Tech Players - "Moreover, the latest independent academic research concludes, large language models like ChatGPT cannot learn independently or acquire new skills, meaning they pose no existential threat to humanity." The coalition also took issue with the ...
1 month ago Darkreading.com
Protecting Encryption And Privacy In The US: 2023 Year in Review - The best technology to protect that right is end-to-end encryption. 2023 has been a year of unprecedented threats to encryption and privacy. In the US, three Senate bills were introduced that, in our view, would discourage, weaken, or create ...
10 months ago Eff.org
California Governor Vetoes AI Safety Bill | Silicon UK Tech News - US tech companies and researchers voiced similar concerns over the California bill, with Li Feifei, known as the “godmother of AI” and co-founder of AI start-up World Labs, saying in an August opinion piece that the bill would “harm ...
1 month ago Silicon.co.uk
Fighting For Your Digital Rights Across the Country: Year in Review 2023 - EFF works every year to improve policy in ways that protect your digital rights in states across the country. Thanks to the messages of hundreds of EFF members across the country, we've spoken up for digital rights this year from Sacramento to ...
10 months ago Eff.org
The Role of XBOMs in Supporting Cybersecurity - Everyone in an organization plays an important role in ensuring that their products and services are delivered safely to their customers. Whether you're producing software or hardware, part of the manufacturing process, or anywhere in the software ...
10 months ago Securityboulevard.com
The House Intelligence Committee's Surveillance 'Reform' Bill is a Farce - Earlier this week, both the House Committee on the Judiciary and the House Permanent Select Committee on Intelligence marked up two very different bills, both of which would reauthorize Section 702 of the Foreign Intelligence Surveillance Act-but in ...
11 months ago Eff.org
Kids Online Safety Shouldn't Require Massive Online Censorship and Surveillance: 2023 Year in Review - Many of these bills would run roughshod over the rights of young people and adults in the process. There's also good news: so far, none of these dangerous bills have been passed at the federal level, or signed into law. That's thanks to a large ...
10 months ago Eff.org
International Threats to Freedom of Expression: 2023 Year in Review - 2023 has been an unfortunate reminder that the right to free expression is most fragile for groups on the margins, and that it can quickly become a casualty during global conflicts. They surfaced in bills and laws around the world that explicitly ...
10 months ago Eff.org
CVE-2017-10401 - Vulnerability in the Oracle Hospitality Cruise Materials Management component of Oracle Hospitality Applications (subcomponent: MMSUpdater). The supported version that is affected is 7.30.564.0. Easily exploitable vulnerability allows low privileged ...
5 years ago
Vermont passes data privacy law allowing consumers to sue companies - Vermont's legislature on Friday passed one of the country's strongest comprehensive data privacy laws, with language allowing individuals to sue companies for violating their privacy rights - an unprecedented provision among similar existing state ...
6 months ago Therecord.media
What Is Software Piracy? - Software piracy has become a worldwide issue, with China, the United States and India being the top three offenders. In 2022, 6.2% of people worldwide visited software piracy websites. Software piracy doesn't require a hacker or skilled coder. Any ...
11 months ago Pandasecurity.com
New Surveillance Reform Bill Raises Concerns Regarding Americans Data Privacy - Spies might be made out of regular employees at US companies if the recently proposed and approved legislation by the House Intelligence Committee greatly expands the federal government's surveillance powers, experts warn. Section 702 was enacted to ...
11 months ago Cysecurity.news
Understanding SBOMs - In recent years, the adoption of open-source software in development has surged, now comprising up to 90% of what's built. There is a crucial aspect to consider when integrating open-source software components. To make sure their software is safe, ...
11 months ago Securityboulevard.com
Congress Should Give Up on Unconstitutional TikTok Bans - TAKE ACTION. TELL CONGRESS: DON'T BAN TIKTOK. As a first step, H.R. 7521 would force TikTok to find a new owner that is not based in a foreign adversarial country within the next 180 days or be banned until it does so. If deemed a national security ...
8 months ago Eff.org
Don't Fall for the Latest Changes to the Dangerous Kids Online Safety Act - The authors of the dangerous Kids Online Safety Act unveiled an amended version this week, but it's still an unconstitutional censorship bill that continues to empower state officials to target services and online content they do not like. TAKE ...
9 months ago Eff.org
The Future of AI Safety: What California's Vetoed Bill Means - Although the veto was a setback for the bill, it highlights key debates in the emerging field of AI governance and the potential for California to shape the future of AI regulation. With the rapid advancement of AI technology, California's ...
1 month ago Darkreading.com
CVE-2017-10054 - Vulnerability in the Oracle Hospitality Cruise Materials Management component of Oracle Hospitality Applications (subcomponent: MMS). The supported version that is affected is 7.30.564.0. Easily exploitable vulnerability allows unauthenticated ...
5 years ago
Superconductor Claim 'Baseless' Experts - 'Breakthrough' claim by South Korean researchers of a room-temperature superconductor dismissed by reviewing experts. Doubts about a breakthrough claim earlier this year by a group of South Korean researchers appear to be justified, after experts ...
11 months ago Silicon.co.uk
The Crucial Need for a Secure Software Development Lifecycle in Today's Digital Landscape - In today's increasingly digital world, software is the backbone of business operations, from customer-facing applications to internal processes. The rapid growth of software development has also made organizations more vulnerable to security threats. ...
10 months ago Cyberdefensemagazine.com
Taking Back the Web with Decentralization: 2023 in Review - In the past few years, there's been an accelerating swing back toward decentralization. Users are fed up with the concentration of power, and the prevalence of privacy and free expression violations, and many users are fleeing to smaller, ...
10 months ago Eff.org
Cybersecurity considerations to have when shopping for holiday gifts - Another aspect of security that many shoppers don't consider this time of year is the security of the products they're buying, even through a legitimate online marketplace. This is a glaring issue with home security cameras and Wi-Fi-connected ...
11 months ago Blog.talosintelligence.com
Bill Would Require Privacy Compliance For Period-Tracking Apps - With a fast-growing number of users, period-tracking apps have opened up a new way for people to track their menstrual cycle and other vital health information. But, are they securely storing and protecting user data? A bill introduced in Congress ...
1 year ago Securityweek.com
Bill targets suicide hotline vulnerabilities after cyberattack on Intrado - A newly proposed bipartisan bill takes aim at the cybersecurity challenges facing the national suicide hotline, brought to light after a cyberattack led to widespread outages of the system in December. Jay Obernolte, R-Calif., and Tony Cárdenas, ...
1 year ago Packetstormsecurity.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)