Tagged articles
19 articles
Page 1 of 1
DevOps in Software Development
DevOps in Software Development
Dec 1, 2025 · Information Security

Why Trusted Component Repositories Are Critical for Military Software Security

The article examines how modern military software, built largely from third‑party components, faces supply‑chain attacks, explains the need for SBOMs, and proposes a centralized trusted component repository with automated scanning, compliance checks, and full‑lifecycle auditing to secure defense systems.

DevOpsSBOMVulnerability Management
0 likes · 8 min read
Why Trusted Component Repositories Are Critical for Military Software Security
Continuous Delivery 2.0
Continuous Delivery 2.0
Nov 25, 2025 · Information Security

How SBOM and SLSA Transform Software Supply Chain Security and Boost ROI

This article examines the core applications of Software Bill of Materials (SBOM) and the SLSA framework across vulnerability response, license compliance, merger due‑diligence, and container image integrity, quantifies their return on investment, and showcases real‑world implementations by leading tech firms, highlighting how they enhance enterprise security, operational efficiency, and competitive advantage.

ROISBOMSLSA
0 likes · 17 min read
How SBOM and SLSA Transform Software Supply Chain Security and Boost ROI
Continuous Delivery 2.0
Continuous Delivery 2.0
Nov 21, 2025 · Information Security

How Google, Microsoft, and Meta Are Shaping SBOM Practices for Secure Software Supply Chains

This article examines the distinct SBOM strategies of Google, Microsoft, and Meta, highlighting Google's large‑scale automation, Microsoft's open‑source tooling, and Meta's internal security integration, and draws lessons for enterprises seeking transparent and resilient software supply chain governance.

Cloud NativeDevOpsOpen standards
0 likes · 10 min read
How Google, Microsoft, and Meta Are Shaping SBOM Practices for Secure Software Supply Chains
Continuous Delivery 2.0
Continuous Delivery 2.0
Nov 20, 2025 · Information Security

Why SBOM Is Critical for Modern Software Security and How to Choose Between SPDX and CycloneDX

The article explains what a Software Bill of Materials (SBOM) is, why it has become a strategic security requirement, compares the leading SPDX and CycloneDX standards, examines China's emerging DSDX format, and offers practical guidance on selecting the right SBOM format and tools for various compliance and risk‑management scenarios.

CycloneDXSBOMSPDX
0 likes · 13 min read
Why SBOM Is Critical for Modern Software Security and How to Choose Between SPDX and CycloneDX
Continuous Delivery 2.0
Continuous Delivery 2.0
Jun 8, 2025 · Information Security

Why SBOMs Are the Key to Secure Software Supply Chains

This article explains how Software Bill of Materials (SBOM) mirrors hardware BOMs, outlines their core differences, presents best practices, tools, and implementation strategies to improve supply‑chain transparency, compliance, and security for modern software development.

SBOMSecuritycompliance
0 likes · 12 min read
Why SBOMs Are the Key to Secure Software Supply Chains
Continuous Delivery 2.0
Continuous Delivery 2.0
Jun 7, 2025 · Information Security

Unlocking Software Supply Chain Security with SBOM

This article explains how Software Bill of Materials (SBOM) serves as a digital map for component dependency and change management, detailing its functions in visualizing dependencies, detecting version conflicts, ensuring license compliance, and providing supply‑chain risk alerts, ultimately improving development efficiency, security, and regulatory compliance.

SBOMSecuritycompliance
0 likes · 11 min read
Unlocking Software Supply Chain Security with SBOM
Java Architecture Diary
Java Architecture Diary
May 28, 2024 · Backend Development

How to Generate and Expose SBOMs in Spring Boot 3.3.0

This guide explains how Spring Boot 3.3.0 natively supports Software Bill‑of‑Materials (SBOM) generation with CycloneDX, shows Gradle and Maven configuration steps, demonstrates building an uber‑jar that includes the SBOM, and details how to expose the SBOM via Actuator endpoints and customize formats.

ActuatorCycloneDXGradle
0 likes · 8 min read
How to Generate and Expose SBOMs in Spring Boot 3.3.0
vivo Internet Technology
vivo Internet Technology
Feb 26, 2024 · R&D Management

OSPO Maturity Model: Five‑Stage Framework and Checklist

The article introduces a five‑stage OSPO maturity model—ranging from ad‑hoc open‑source use to a strategic technology advisor—detailing essential patterns, recommended community resources, and a practical checklist to help organizations build compliance, advocacy, project‑launch, and governance capabilities for open‑source programs.

Maturity ModelOSPOSBOM
0 likes · 16 min read
OSPO Maturity Model: Five‑Stage Framework and Checklist
Efficient Ops
Efficient Ops
Jun 27, 2023 · Information Security

How a Bank Secures Open‑Source Software: Practices, Policies, and Platforms

This article explains how open‑source technologies drive digital transformation in finance, outlines the regulatory "Opinions" guiding secure, compliant use, and details a comprehensive open‑source security management framework—including lifecycle standards, a dedicated platform, DevOps integration, SBOM adoption, and continuous risk mitigation.

DevOpsSBOMcompliance
0 likes · 10 min read
How a Bank Secures Open‑Source Software: Practices, Policies, and Platforms
Cloud Native Technology Community
Cloud Native Technology Community
Jan 30, 2023 · Cloud Native

2023 Cloud‑Native Trends and Predictions: Cloud IDEs, FinOps, SBOM, GitOps, OpenTelemetry, WebAssembly and More

The article surveys the 2023 cloud‑native landscape, highlighting the rise of cloud‑based IDEs, the mainstreaming of FinOps and GreenOps, the ubiquity of open‑source SBOMs, the maturation of GitOps and OpenTelemetry, the growing impact of WebAssembly, and several related forecasts for the industry.

Cloud NativeFinOpsGitOps
0 likes · 21 min read
2023 Cloud‑Native Trends and Predictions: Cloud IDEs, FinOps, SBOM, GitOps, OpenTelemetry, WebAssembly and More
21CTO
21CTO
Jan 3, 2023 · Information Security

How Google’s OSV-Scanner Helps Secure Your Open‑Source Dependencies

Google’s open‑source OSV‑Scanner provides a powerful front‑end to the OSV vulnerability database, allowing developers to scan directories, SBOMs, and Docker images for known security issues across 16 ecosystems, outputting results in JSON or table format and supporting ignore rules for specific vulnerabilities.

OSV-ScannerSBOMdependency management
0 likes · 6 min read
How Google’s OSV-Scanner Helps Secure Your Open‑Source Dependencies
Meituan Technology Team
Meituan Technology Team
May 26, 2022 · Information Security

Building and Deploying Software Composition Analysis (SCA) for Enterprise Security

The article analyzes the rising threat of open‑source components, explains Software Composition Analysis (SCA) and SBOM generation, outlines the three‑stage process for building an in‑house SCA capability, discusses practical challenges such as data quality and integration, and looks ahead to future standards and open‑source tools.

DevSecOpsNLPSBOM
0 likes · 37 min read
Building and Deploying Software Composition Analysis (SCA) for Enterprise Security
21CTO
21CTO
Dec 27, 2021 · Operations

Rediscovered 1994 Linus Torvalds Talk & Linux 5.16 Powers AMD Laptops Up to 14%

The article reveals the recovered 1994 Linus Torvalds presentation, highlights Linux 5.16's performance gains for AMD mobile CPUs, discusses upcoming Linux security initiatives such as SBOM and Rust adoption, and warns of compatibility challenges as Chrome approaches version 100.

AMDChromeKernel
0 likes · 8 min read
Rediscovered 1994 Linus Torvalds Talk & Linux 5.16 Powers AMD Laptops Up to 14%