A Comprehensive Security Approach Security is not just about tools—it's a comprehensive approach that should be integrated into every layer of system design. The concept of "Secure by Design" emphasizes building security into technology products right from the initial...
Open Source Embedded Software Development and Security Blog
Everything You Should Know About Known Exploited Vulnerabilities (KEVs) and How They Differ From CVEs
What are Known Exploited Vulnerabilities (KEVs), and why should you care? As embedded Linux developers, we navigate a world of code, configurations, and complex systems daily. It's a universe where every line of code is a potential gateway for malicious actors seeking...
Elevating Your SCA Management with the Power of Vigiles-CLI
In the realm of Software Composition Analysis (SCA), the significance of robust tools cannot be overstated. To further elevate your experience with Vigiles, our comprehensive SCA tool, we're thrilled to introduce the Vigiles Command-Line Interface (CLI) - a...
Choosing the Right SBOM Tool: A Comparison of Top SBOM Generation Tools
Choosing the right SBOM generation tool for your needs can be a daunting and challenging task, given the wide array of options available and ecosystems to work within. A well-formed SBOM should: contain all the elements required for you to meet the NTIA “minimum...
Choosing the Right SBOM Generation Tool: Key Criteria for Evaluating SBOM Generation Tools
As you know, choosing the right SBOM generation tool plays a pivotal role in open source security, compliance, and project efficiency. The consequences of using an unsuitable tool can be severe, from incomplete or inaccurate information to missed security updates and...
Choosing the Right SBOM Generation Tool: Why is it a Critical Step in Open Source Security?
In today’s constantly evolving world of software development where the use of open source components has become the norm and vulnerability risks are a weekly hurdle, ensuring the security and compliance of your projects may seem like an impossible feat – but it is...
How to Actually Understand and Use the 6 Different Types of CISA SBOMs
What is an SBOM and why is it important? If you’re new to the word “SBOM” and every time you hear it think, “What bill? I don’t want to pay a bill!” then this article is for you! A “SBOM” or “Software Bill of Materials” is an inventory of the components that make up a...