Transcript
Cyberwire Host (0:02)
You're listening to the Cyberwire network, powered by N2K.
Zscaler Representative (0:11)
And now a message from our sponsor. Zscaler, the leader in cloud security Enterprises have spent billions of dollars on firewalls and VPNs, yet breaches continue to rise by an 18% year over year increase in ransomware attacks and a $75 million record payout in 2024. These traditional security tools expand your attack surface with public facing IPs that are exploited by bad actors more easily than ever with AI tools. It's time to rethink your security Zscaler Zero Trust plus AI stops attackers by hiding your attack surface, making apps and IPs invisible eliminating lateral movement Connecting users only to specific apps, not the entire network Continuously verifying every request based on identity and context simplifying security management with AI powered automation and detecting threats using AI to analyze over 500 billion daily transactions hackers can't attack what they can't see. Protect your organization with Zscaler Zero Trust and AI. Learn more@zscaler.com Security.
Nyla Genoi (1:34)
The word is SBOM, spelled S for software, B for bill and OM for of materials A formal record containing the details and supply chain relationships of various components used in building software. Example sentence sboms are lists of nested software components designed to enable supply chain transparency, origin and context. According to the NIST Cybersecurity Framework, if an organization does not know what its software contains, it should assume that the software is compromised and develop an appropriate risk management plan. Today, very little software is completely original. According to Forrester Sandy Corelli, on average, 75% of a software product is open source code, meaning developers are using existing commercially available software components to create new products. This presents a cyber risk management problem because customers typically receive software products without understanding the nested software contained within. On September 9, 2021, the software package Data Exchange specification SPDX for short, became the international open standard for security, license compliance and other software supply chain artifacts. In other words, they became the official SBOM standards body despite only being internationally recognized for a short while. Companies like Intel, Microsoft, Sony and VMware are already using the SPDX standards to communicate SBOM information. SPDX wasn't an overnight invention, though. It was the result of 10 years of collaboration from vendors across the Software Composition Analysis Space or SCA space. These are vendor tools that assess open source software code libraries and containers to provide a unified view of risks and remediations and offer strategies to keep this kind of software up to date. Still, tools from this market have not been an essential component to most development teams, except for highly specific software niche requirements. That may be beginning to change, though. President Joe Biden's May 2021 executive order on cybersecurity, EO1402Amandates that all federal civilian executive branch agencies and key players like CISA, OMB, DHS, and the DoD meet or exceed specific cybersecurity requirements. Among a long list that includes zero trust improvements to the federal acquisition regulation or far improved information sharing between agencies and secure cloud deployment, there is a specific requirement to deploy a minimum SBOM program, which by the spring of 2022, with the US government mandating SBoM requirements, vendors that sell to the US government will have to comply. It's tough to predict these things, but once government contractors routinely provide SBOM information, that capability becomes a discriminator against other software vendors in the commercial space. Why would you pick a vendor who doesn't provide SBOM telemetry when other vendors are available who do? If this works out, the Presidential directive could fast track sbombs to an existing standard of protection against supply chain vulnerabilities. Nerd Reference On 16 May 2021, President Biden spoke to the press about the Colonial Pipeline ransomware attack and the need to make infrastructure more resilient. He announced his Executive Order on Improving the Nation's Cybersecurity and described the goals behind it.
![software bill of materials (SBOM) (noun) [Word Notes] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F58ab7ae0-def8-11ea-b34c-b35b208b0539%2Fimage%2Fdaily-podcast-cover-art-cw.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)