Understanding The Role Of Software Bill Of Materials In Cybersecurity Readiness

Understanding The Role Of Software Bill Of Materials
Cybersecurity issues are top of mind across the open source community, and beyond. In response to the ongoing threat of cyber attacks, Linux Foundation Research, in partnership with SPDX, OpenChain, and OpenSSF, has conducted the first in a series of research projects to understand the challenges and opportunities for securing software supply chains. This soon-to-be-published report, The State of Software Bill of Materials (SBOM) and Cybersecurity Readiness, will be released to coincide with this webinar.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Workforce continuity and the Future of Work

For the past 30 years Citrix has helped organizations like yours embrace the ‘future of work.’ We know that the ‘future’ itself is a moving target and external forces can hamper business and the workforce. To minimize the risk of unforeseen events and foster enduring competitive advantage you will learn: What is business continu
Watch Now

Business Continuity Insights, Considerations and Recommendations

Business disruptions from power outages to global pandemics impact organizations of all sizes. The goal of IT leadership within an organization is to ensure their users are still productive while maintaining some level of control of these users access to corporate resources. Creating an effective business continuity and disaster
Watch Now

Web Application Security Essentials

We know it’s a challenge to stay on top of your web application security with new vulnerabilities being introduced all the time by untrained developers. So what can be done? The most efficient way to reduce the attack surface is to educate your entire team on recognizing potential web security issues to avoid introducing vulnerabilities in the first place.
Watch Now

Solving for Compliance and Zero Trust with Istio Ambient Mesh

Istio ambient mesh uses a sidecar-less data plane that focuses on ease of operations, incremental adoption, and separation of security boundaries for applications and mesh infrastructure.
Watch Now