Nonprofits exist to change the world. Whether you’re tackling hunger, providing essential care, or working on countless other missions, the work you do matters. But your impact is also what makes you a prime target for exploitation. You may not have the deep pockets of big corporations, but you do have something hackers want: data…
Continue ReadingSBOMs
Software Security in RetailTech: Keeping Your Systems Safe While Meeting Customer Demands
The retail technology industry, or RetailTech for short, has completely changed how we shop, making everything from point-of-sale (POS) systems to inventory management and e-commerce platforms faster, smarter, and more seamless. Unfortunately, the technology advancements that we love as consumers, and that retailers expect from technology providers, also make things easier for cybercriminals who would…
Continue ReadingTen Tips to Protect Your Dev Team from Business Interruptions
In today’s fast-paced digital world, development teams are constantly under pressure to deliver innovative solutions. However, technical audits, business compliance requirements, and IT governance policies can create unexpected interruptions that disrupt workflows and slow progress. Here are ten tips to protect your development team from these business interruptions by integrating security and compliance into their…
Continue ReadingWhat Makes SOOS Different from Other AppSec Platforms
If you’re building software, you’ve probably been burned by application security tools that promise the world and fail to deliver. Maybe they flood you with irrelevant alerts, break your builds, slow down your pipelines, or impose limits on when and how you can use them. Whatever it is, you don’t want hype; you want a…
Continue ReadingGetting the Most Out of SCA
Software Composition Analysis (SCA) is an important practice in modern software development, enabling teams to manage and secure the open-source components within their applications. By effectively utilizing SCA tools, such as SOOS’s Software Composition Analysis, you can identify vulnerabilities, ensure license compliance, and maintain the integrity of your software to avoid costly security, business, and…
Continue ReadingAdvanced Governance in SCA
Governance in Software Composition Analysis Governance in SCA solutions is an often overlooked yet extremely powerful feature set that can significantly improve a company’s supply chain security, and legal compliance. Governance or Governance Policies consist of the ability to create rules which restrict open source packages based on certain criteria. The result of running these…
Continue ReadingSOOS Year in Review
We’ve had an exciting year at SOOS. We want to thank all of our customers for a great 2022, and an even better 2023!
Continue ReadingSBOM 101: What is an SBOM? Why are they important?
SBOM stands for “software bill of materials.” At its most simplistic level, an SBOM is a list of “ingredients” that describes the components in a software application. More precisely (per the NTIA), a SBOM is a “complete, formally structured list of components, libraries and modules that are required to build a given piece of software…
Continue ReadingSBOMs to Be Required for Software Developers Who Do Business with the Federal Government
In May of 2021, the Biden Administration issued a new and aggressive mandate to all government agencies to ratchet up cybersecurity. As a result, we can expect to see an SBOM requirement for all software developers doing business with the Federal Government. EO 14028, The Executive Order Improving the Nation’s Cybersecurity, is a broad and…
Continue ReadingThe Executive Order on Improving the Nation’s Cybersecurity is a Game-Changer. Get Ready.
On May 12, 2021, President Biden issued the “Executive Order on Improving the Nation’s Cybersecurity (14028).” It’s a game-changing piece of legislation. And, like a lot of federal policy, it’s dense and hard to read, often raising as many questions as it answers. This order is frequently referred to as the Executive Order on Cybersecurity….
Continue Reading