logo
SBOMs (as well as HBOMs and CBOMs) as Cybersecurity Facilitators

SBOMs (as well as HBOMs and CBOMs) as Cybersecurity Facilitators

Forbes29-04-2025
Cyber security, information privacy and data protection concept on server room background.
Software Bills of Materials (SBOMs) are crucial cybersecurity tools because they assist companies in locating, evaluating, and reducing software risks. They allow software updates and vulnerabilities to be tracked over the course of a product's lifecycle.
Modern software is created using code fragments and methods from various sources, including open source and commercial solutions. The software components and dependencies of an application are detailed in a tool known as a Software Bill of Materials (SBOM) (NTIA, 2021). An SBOM is essential for managing and understanding the complexities of contemporary software supply chains and can be compared to an ingredient list on a food product label. A software package and its contents are uniquely identified by an SBOM, which is formal, machine-readable metadata that may also contain information on the software package's contents, such as copyrights and license information.
The increasing complexity of modern software and its vulnerability to programming errors and hacks give rise to serious security dangers and compatibility issues. Additionally, cyberthreats are continually finding ways of evolving, becoming more complicated, and multiplying due to the use of artificial intelligence and the quick acceleration of development velocity. It becomes more difficult to identify and address security vulnerabilities when we are looking not only at our codebase but also at the 70–80% open-source software that we depend on, as well as third-party software components from other vendors. However, a few tools can assist in handling the data protection work.
Recent high-profile events highlight the need for SBOMs in cybersecurity. A programming flaw in the CrowdStrike software, for instance, affected more than 8.5 million Windows computers globally, resulting in billions of dollars' worth of losses. The well-known Linux data compression program XZ Utils was found to contain a backdoor as part of a sophisticated state actor attack around the beginning of 2024. 93% of cloud settings were vulnerable to the zero-day Log4Shell vulnerability in 2021. In the SUNBURST assault, which FireEye discovered in December 2020, harmful code was embedded into SolarWinds' Orion software.
According to Allan Friedman, CISA Senior Advisor and Strategist. 'A thriving ecosystem for SBOM tools and solutions will be key to shaping a more transparent software-driven world.' He notes that 'Vulnerabilities in software are a key risk in cybersecurity, with known exploits being a primary path for bad actors to inflict a range of harms. By leveraging SBOMs as key elements of software security, we can mitigate the risk to the software supply chain and respond to new risks faster, and more efficiently.
The government-wide push to integrate cybersecurity into products supplied to the government and transfer responsibility for cybersecurity from agencies to vendors and integrators is reflected in this emphasis on SBOMs.
By February 2025, almost all new software that the Army purchases or develops will need to have an SBOM. In order to obtain assurances regarding supply-chain security, the Army opted for an SBOM approach rather than self-attestations. This is because SBOMs offer essential information regarding the risks that systems may pose to a network and can assist in organizing an organization to minimize those risks as much as possible.
3D illustration of the text zero trust over black background with padlock shapes in relief. Concept ... More of network security.
SBOMs play a significant role in cybersecurity and align with 'Zero-Trust' policies in both the private and public sectors. Dmitry Raidman. Chief Technology Officer and Co-founder of Cybeats, states, 'One significant advantage of a verified SBOM is its application in cybersecurity and risk mitigation for the downstream customers, for example, a power distribution plant, hospital, or water treatment facility. Industry studies indicate that the average codebase contains 70-80%, and in some cases over 90% open-source software components, many of which have at least one vulnerability, and some of them are highly exploitable, like Log4j. Therefore, understanding and continuously monitoring code components and their vulnerabilities is essential.' He points out that companies that collect from vendors SBOMs and invest in solutions to process and monitor the vulnerability lifecycle management of their assets will be better prepared to deal with cybersecurity challenges in the future and ensure the safety, security, and resilience of their critical systems and infrastructure.
SBOMs can help businesses track vulnerabilities in real time and maintain an accurate software inventory. Continuous security requires ongoing Vulnerability Lifecycle Monitoring. In order to detect and address known vulnerabilities and not just rely on security advisories published by vendors, where it is to the vendor's discretion what vulnerability to disclose, an SBOM can offer transparency into the precise software versions being used and allow complete understanding of the threat landscape. Additionally, it facilitates the management and quantification of commercial software licenses. Organizations can compare SBOM data with databases like NIST NVD and CISA KEV to find and prioritize affected systems when new CVEs are found and also record their findings if the vulnerability doesn't pose a risk in their operations and environment.
To help evaluate SBOM component information against different threat signatures and patterns, the National Security Agency (NSA) supports the use of AI/ML engines and related "data lakes." A crucial component of efficient SBOM management is vulnerability tracking and analysis, which entails delivering daily updates from the National Vulnerability Database (NVD) and additional vulnerability data sources.
SBOMs are crucial for Incident Response and Threat Intelligence. They help security teams quickly identify compromised components in apps and determine available mitigation options and vendor updates during a cyber incident.
A major cause of breaches is vulnerabilities based on the Verizon 2025 DBIR Report. There is a 34% increase in attackers exploiting vulnerabilities to gain initial access and cause security breaches, compared to 2024. The bling spot of awareness and a patching strategy is a significant factor affecting these numbers. Risk-Based Patch Management suggests that not every vulnerability needs immediate fixing. Teams can prioritize threats by combining SBOMs with Vulnerability Threat Intelligence (VTI), particularly if there's a known exploit for mitigating vulnerability.
Compliance and regulation concept. Enforcement of laws, regulations, and standards, requirements, ... More internal policies and procedures. Minimize legal and financial risks, protect corporate reputation.
GRC, SBOMs assist in ensuring compliance and regulatory readiness throughout the procurement lifecycle and can help to avoid buying non maintained and non-secure product. Organizations are required to demonstrate that they monitor and manage risk throughout their software supply chain lifecycle in accordance with new government regulations regarding safe software development. SBOMs provide documentation for compliance with FDA, NIST, PCI DSS, PCI SSF, EU CRA, RED, ETSI EN 303 645, BSI TR-03183, EO 14028, as well as the upcoming US DoD procurement requirements.
A "software bill of materials" (SBOM) has become a crucial component of software security and software supply chain risk management, according to CISA. As businesses rely more on third-party components and complex systems, software supply chain security has become a top responsibility. Vulnerability management must be implemented throughout the software lifecycle, from design to deployment and operations, to handle the entire range of security threats. This all-encompassing strategy, sometimes referred to as "shifting left and even more important shifting right, guarantees that vulnerabilities are consistently recognized, evaluated, and reduced.
In 2019, the medical technology sector launched a proof of concept to assess SBOMs' ability to manage operational and cyber risks in medical devices. Device makers (MDM) and healthcare (HDO) providers demonstrated the feasibility of SBOMs by producing, exchanging, and applying data to improve security procedures. In 2025, with a growing digital risk landscape, all industries must utilize SBOMs to help enable better cybersecurity and transparency into software based products they build and the ones they consume.
It does not end with software. As teams embed AI models and language pipelines across their products, an Artificial Intelligence Software Bill of Materials (AI SBOM) becomes essential. An AI SBOM lists every model file, training dataset, agent, and external inference service, giving product security teams the same clear inventory they expect from a traditional SBOM, down to the last line of code. Dmitry Raidman explains that an AI SBOM provides 'an X ray view of the intelligent functionality,' allowing teams to know exactly what is running in production, how it was trained, and what they are receiving from vendors or delivering to customers.
A Hardware Bill of Materials (HBOM) performs the same role for physical components. It maps every chip, board, sensor, and firmware version so security and procurement teams can detect counterfeit parts and unvetted substitutions before they reach production. A long-planned pager hardware supply chain attack reported in Lebanon underscored why HBOM transparency and validation matter; altered pagers were covertly introduced and later exploited, showing how a single tampered device can become a beachhead for wider compromise when hardware provenance is unclear.
A Cryptography Bill of Materials, CBOM, catalogs every algorithm, protocol, library, and certificate in your products, giving security teams a clear map of where cryptography lives. With quantum safe standards such as CRYSTALS Dilithium on the horizon, you must know exactly where RSA 2048-bit or ECC P-256 still protect data so you can schedule timely upgrades to post quantum cryptography. Dmitry Raidman sums it up: 'A CBOM is your migration roadmap. When quantum capable attackers will be on the horizon you cannot replace vulnerable ciphers, you do not even know you have.'
SBOMs, HBOMs, and CBOMs will be crucial for risk management in our digital environment in the future. Even though the 'BOM' adoption cycle is still in its early phases, more transparency and accountability about hardware security, software security, and optimization will benefit both the public and private sectors.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Is SentinelOne Stock a Buy, Sell, or Hold in July 2025?
Is SentinelOne Stock a Buy, Sell, or Hold in July 2025?

Yahoo

time8 hours ago

  • Yahoo

Is SentinelOne Stock a Buy, Sell, or Hold in July 2025?

A fresh cyberattack targeting Microsoft's (MSFT) widely used SharePoint server software sent shockwaves through the cybersecurity industry this week. As reports of the exploit surfaced, investors rushed into names they believe are best positioned to combat these evolving threats. SentinelOne (S) was among the biggest winners, surging 8% in midday trading on July 21. The company's advanced Singularity Platform, powered by AI and built to secure endpoints, cloud workloads, and identity systems, has drawn renewed investor confidence. Peers like CrowdStrike (CRWD), Palo Alto Networks (PANW), and Fortinet (FTNT) also saw strong upside. More News from Barchart China, Chips, and Chaos: Where Smart Investors Are Putting Their Money Now Alphabet Had a 'Standout Quarter.' Should You Buy GOOG Stock Here? The Saturday Spread: Leveraging Practical Math to Extract Alpha in Hidden Places Tired of missing midday reversals? The FREE Barchart Brief newsletter keeps you in the know. Sign up now! But among them, SentinelOne's aggressive innovation and autonomous threat response tech have set it apart. So, as cyber risks mount and investor interest heats up, the question now is: Is SentinelOne stock a buy, sell, or hold? Let's dig in. About SentinelOne Stock Based in California, SentinelOne is a leading cybersecurity firm known for its AI-powered Singularity Platform. The Singularity Platform provides autonomous threat prevention and response capabilities. Its platform is designed to offer comprehensive visibility and protection across endpoints, cloud workloads, and identity credentials. SentinelOne's focus on an AI-driven approach, combined with its ability to provide a unified cybersecurity solution, sets it apart from many competitors who may rely on more traditional, manual threat management techniques. Valued at $6.5 billion by market cap, SentinelOne shares have had a tough 2025. After hitting a 52-week high of $29.29 in November 2024, the stock has dropped about 11% year-to-date, pressured by a lowered full-year revenue outlook and mounting competition in the crowded cybersecurity landscape. In terms of valuation, SentinelOne trades at 7.9x forward sales, well below peers like CrowdStrike at 29x and Palo Alto Networks at 16.6x. Given its strong growth and AI-driven edge, this discounted valuation supports bullish sentiment and reflects its unique niche in autonomous cybersecurity. SentinelOne Q1 Revenue Surges, Yet the Company Lowers Outlook On May 28, SentinelOne posted its first quarter results for fiscal year 2026, which showed robust growth with mixed profitability. Total revenue was came in $229.0 million, up 23% year-over-year, while annual recurring revenue (ARR) hit $948.1 million 24% growth YOY. About two‑thirds of that revenue comes from the U.S., with the rest spread across international markets. Their gross margins are solid, too, around 75% on a GAAP basis and 79% when you strip out certain non‑cash costs. On the earnings front, though, GAAP accounting still shows a $208 million loss, about 91% of revenue, which is wider than the $70 million loss reported a year ago. However, when you back out non‑cash expenses like stock‑based comp and amortization, SentinelOne actually squeezed out a small profit, about a 3% net margin. That translated to roughly $0.02 of adjusted EPS, in line with expectations. SentinelOne produced record cash flow in this quarter, generating cash flow at a 20% this quarter versus 18% last year and ended Q1 with roughly $1.2 billion in cash and investments on hand. However, headwinds remain. Management noted elongated sales cycles and macro uncertainty impacting net new ARR growth. Competition in cybersecurity is fierce, and SentinelOne must execute on cross-selling and efficiency. The recent guidance cut hints at caution. SentinelOne cut its full-year revenue guidance between $996 million and $1 billion, down from $1.01 billion to $1.012 billion, blaming softer enterprise spending, economic uncertainty and intensifying endpoint security competition. Conclusion: Buy, Sell, or Hold? SentinelOne looks like a classic growth stock that's starting to turn the corner toward profitability. Revenue is growing steadily, about 23% to 29% a year, and free cash flow has finally flipped into positive territory. Wall Street seems cautiously optimistic. Analysts have a 'Moderate Buy' rating overall, with 22 calling it a 'Strong Buy,' one more tagging it a 'Moderate Buy,' and 11 sitting on the sidelines with a 'Hold.' The average price target is $23, which suggests about 16% upside from here. On the date of publication, Nauman Khan did not have (either directly or indirectly) positions in any of the securities mentioned in this article. All information and data in this article is solely for informational purposes. This article was originally published on

New FBI Warning — Windows And Linux Users Must Apply 2FA Now
New FBI Warning — Windows And Linux Users Must Apply 2FA Now

Forbes

time10 hours ago

  • Forbes

New FBI Warning — Windows And Linux Users Must Apply 2FA Now

FBI warns of Interlock threat - enable 2FA now. There are some weeks that I almost feel like I have joined the Federal Bureau of Investigation, given the number of alerts that I am exposed to. Within just the last few days, I have shared a warning to 10 million Android users to disconnect their devices, another for all smartphone users as phantom hacker attacks continue, and now comes the FBI recommendation for Windows and Linux users to urgently enable two-factor authentication to complete the cyber-trilogy. Here's everything you need to know when it comes to mitigating the Interlock ransomware threat. FBI And CISA Issue Joint Interlock Ransomware Warning A relatively new ransomware threat is, according to the Cybersecurity and Infrastructure Security Agency, on the rise and targeting both businesses and critical infrastructure providers with double-extortion attacks. A July 22 joint cybersecurity advisory, issued alongside the FBI under alert code aa25-203a, was prompted by ongoing FBI investigations that have identified both indicators of compromise and the tactics, techniques and procedures used by the attackers. 'The FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems,' the alert confirmed. Although I would heartily recommend reading the full alert for all the technical details, the attacks can be summed up as employing drive-by-downloads and ClickFix social engineering to gain initial access. Once the system has been breached, the attackers then deployed credential stealers and keyloggers to obtain account credentials and execute the necessary lateral movement and privilege escalation required to deploy the ransomware and exfiltrate data. This article, however, is less about the how or why (they are after money, duh!) and more concerned with mitigation. Luckily, the FBI has some excellent and detailed advice about how to prevent such attacks, so let's take a look at what you need to do. Mitigating The Interlock Ransomware Threat — The FBI Recommendations Mitigating the Interlock threat Prevention is always better than cure, and that is no truer than when applied to the world of cybersecurity. Mitigating a threat is the priority for every security team, nobody wants to be dealing with the fallout of failings to do. The FBI is aware of this, which is why the cybersecurity alert features a large, red bullet point mitigation table at the top of the advisory. It's also why it's the focus of this article. While the 'actions for organizations to take today' list is, of course, extremely valuable, it is not the complete litigation picture. For that you need to dig deeper into the alert itself. Personally, I would move number four up to number one as well - especially the employing 2FA across accounts advice, as this is crucial in preventing the lateral movement and privilege escalation that enables a successful ransomware attack. But anyhoo, let's explore the full FBI mitigation advice in our own bullet point list, shall we? And, as the FBI notes, implement a recovery plan!

Microsoft Corporation (MSFT): 'Will You Cut It Out?' Asks Jim Cramer
Microsoft Corporation (MSFT): 'Will You Cut It Out?' Asks Jim Cramer

Yahoo

timea day ago

  • Yahoo

Microsoft Corporation (MSFT): 'Will You Cut It Out?' Asks Jim Cramer

We recently published . Microsoft Corporation (NASDAQ:MSFT) is one of the stocks Jim Cramer recently discussed. Microsoft Corporation (NASDAQ:MSFT)'s shares have gained 22% year-to-date as the firm has managed to shift its AI narrative. While the shares had struggled in 2024, the firm has managed to convince investors this year about the profitability of its AI initiatives. In his previous remarks about Microsoft Corporation (NASDAQ:MSFT), Cramer discussed the firm's recent SharePoint hack in detail and commented that it was difficult to criticize Microsoft. This time, he expressed disappointment about the firm's cybersecurity strategy: 'But I do say when I read that [Microsoft SharePoint attack] my first thought was, come one Microsoft, will you cut it out? Will you get your. . software better? Partner again with Crowdstrike or something. This is embarrassing.' Here's what Cramer said about Microsoft Corporation (NASDAQ:MSFT) after the SharePoint hack: 'Because people did not know once again the vulnerabilities. And you can't figure it out yourself because Microsoft is a little opaque. Now I have criticized Microsoft on this stuff. I don't want to go there. Microsoft is a really powerful organization. You have to have their side. I don't have their side. . . . '[On whether the frequency of high profile attacks was getting less] No I think one of the things that we have to recognize is that, there's a lot of these bad corporations that do this stuff. We have to recognize that Iran is very good at this. We have to recognize that Russia is very good at this. . .Because if you call Microsoft it isn't like Microsoft trying to do a patch. Microsoft's frantically trying to do a patch. These guys are frantically getting customers. Now it's interesting, the hack was July 19th, Microsoft. What was July 19th? That was the day last year, eight million computers shut down because of a glitch of Crowdstrike. . . The anniversary! What goes around comes around. But Microsoft is more vulnerable than people realize. But you know what, go ahead and say that. Go ahead and say that. See if Microsoft doesn't respond aggressively that you don't know what you are talking about.' While we acknowledge the potential of MSFT as an investment, our conviction lies in the belief that some AI stocks hold greater promise for delivering higher returns and have limited downside risk. If you are looking for an extremely cheap AI stock that is also a major beneficiary of Trump tariffs and onshoring, see our free report on the . READ NEXT: 30 Stocks That Should Double in 3 Years and 11 Hidden AI Stocks to Buy Right Now. Disclosure: None. This article is originally published at Insider Monkey. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store