Dangerous by Design? By Jillian Bommarito|2023-03-06T13:19:46-05:00March 6th, 2023|Categories: Blog|Tags: dependencies, dilligencer, open source, SBOM, security, software, supply chain, vulnerabilities| Read More
The State of SBOMs in 2022 By Matt Harris|2022-12-20T15:54:02-05:00December 20th, 2022|Categories: Blog|Tags: SBOM, software, supply chain| Read More
Why You Really Need a Data BOM, Not a Software BOM By Jillian Bommarito|2022-04-18T08:00:49-04:00April 18th, 2022|Categories: Blog|Tags: BOM, data, DBOM, Privacy, provenance, SBOM, SCA| Read More
What is Software Composition Analysis and What Are the Limitations? By Michael Bommarito|2022-04-23T11:50:49-04:00April 5th, 2022|Categories: Blog|Tags: data, dependencies, machine learning, SBOM, SCA, software| Read More
SBOMs: the Premise, the Promise, the Peril By Michael Bommarito|2022-04-23T11:48:43-04:00March 30th, 2022|Categories: Blog|Tags: SBOM, security, software| Read More
Snake JARs, Part I: Hidden log4j Dependencies in Python Packages By Michael Bommarito|2022-04-12T15:54:32-04:00January 24th, 2022|Categories: Blog|Tags: dependencies, python, research, SBOM, security, vulnerabilities| Read More
Snake JARs, Part II: Fangs in the Grass By Michael Bommarito|2022-04-12T15:55:29-04:00January 24th, 2022|Categories: Blog|Tags: dependencies, python, research, SBOM, security, vulnerabilities| Read More