Why You Really Need a Data BOM, Not a Software BOM By Jillian Bommarito|2022-04-18T08:00:49-04:00April 18th, 2022|Categories: Blog|Tags: BOM, data, DBOM, Privacy, provenance, SBOM, SCA| Read More
What is Software Composition Analysis and What Are the Limitations? By Michael Bommarito|2022-04-23T11:50:49-04:00April 5th, 2022|Categories: Blog|Tags: data, dependencies, machine learning, SBOM, SCA, software| Read More
SBOMs: the Premise, the Promise, the Peril By Michael Bommarito|2022-04-23T11:48:43-04:00March 30th, 2022|Categories: Blog|Tags: SBOM, security, software| Read More
Snake JARs, Part I: Hidden log4j Dependencies in Python Packages By Michael Bommarito|2022-04-12T15:54:32-04:00January 24th, 2022|Categories: Blog|Tags: dependencies, python, research, SBOM, security, vulnerabilities| Read More
Snake JARs, Part II: Fangs in the Grass By Michael Bommarito|2022-04-12T15:55:29-04:00January 24th, 2022|Categories: Blog|Tags: dependencies, python, research, SBOM, security, vulnerabilities| Read More