Skip to content

Commit d8da402

Browse files
authored
Merge pull request #13 from shiftleftcyber/jason
Add another blog post from LinkedIn
2 parents f97e3eb + 163617d commit d8da402

11 files changed

Lines changed: 47 additions & 4 deletions
File renamed without changes.
File renamed without changes.
File renamed without changes.

marketing/content/blog/what_is_an_sbom_and_why_should_you_care.md renamed to marketing/content/blog/2025-04-20-what_is_an_sbom_and_why_should_you_care.md

File renamed without changes.

marketing/content/blog/made_in_canada_in_groceries_and_in_software.md renamed to marketing/content/blog/2025-04-27-made_in_canada_in_groceries_and_in_software.md

File renamed without changes.

marketing/content/blog/not_all_boms_are_created_equal.md renamed to marketing/content/blog/2025-05-04-not_all_boms_are_created_equal.md

File renamed without changes.
File renamed without changes.

marketing/content/blog/sbom_creators_and_consumers.md renamed to marketing/content/blog/2025-05-18-sbom_creators_and_consumers copy.md

File renamed without changes.
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
+++
2+
author = "Jason Smith"
3+
title = "Why SBOMs Are Not One-and-Done 📦🔄"
4+
date = "2025-05-25"
5+
linkedin = "https://www.linkedin.com/posts/j28smith_sbom-cybersecurity-softwaresupplychain-activity-7325922851973189634-o0SG"
6+
image = "img/thirdparty/2025-05-25-SBOMLifecycle.jpeg"
7+
+++
8+
9+
✅ You've generated an SBOM. Congratulations!
10+
11+
But here's the truth. An SBOM is not a report you create once and tuck away. Modern software changes constantly. New features, updated libraries, security patches, refactored code... All of this reshapes your software supply chain.
12+
13+
That means your SBOM must evolve alongside your software. Here's why a one-and-done SBOM isn't enough:
14+
15+
🔄 Continuous delivery = continuous change
16+
17+
* Your software isn't static. Your SBOM can't be static either.
18+
19+
⚠️ New risks appear every day
20+
21+
* A library that was safe last month might have a critical vulnerability today.
22+
23+
📊 Compliance requirements keep shifting
24+
25+
* Regulators, customers, and partners increasingly expect current SBOMs, not historical snapshots.
26+
27+
🔐 Trust is only as strong as verification
28+
29+
* It's not enough to just have an SBOM. You need to be able to prove it's authentic. Signing SBOMs and using cryptographic verification ensures they haven't been tampered with.
30+
31+
🏗️ Automation is key
32+
33+
* To keep up, SBOM generation needs to be integrated into your CI/CD pipelines - not left as a manual task.
34+
35+
Key takeaway:
36+
37+
If you're not updating your SBOM regularly, you're not really managing your software supply chain. And let's be honest, if you don't have your SBOM generation automated it is already out of date.
38+
39+
Are you automating SBOM generation or piecing it together manually? Are you signing them? What's worked (or hasn't worked) for your team?
40+
41+
If this or any of my past SBOM posts have resonated, drop a comment, I'd love to hear what you think!! 💬👇
42+
43+
#SBOM #CyberSecurity #SoftwareSupplyChain #DevSecOps #OpenSourceSecurity #SupplyChainSecurity #ContinuousDelivery #DigitalTrust #SoftwareIntegrity #SecureDevelopment

marketing/data/features.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"title": "Scalable SBOM Signing & Verification",
44
"description": "Enterprise-grade cryptographic signing and validation for every SBOM you produce or consume.",
55
"icon": "fas fa-shield-alt",
6-
"link": "/securesbom"
6+
"link": "/securesbom/"
77
},
88
{
99
"title": "Standards-Compliant (CycloneDX & SPDX)",
@@ -16,7 +16,7 @@
1616
"title": "Enterprise-Ready Architecture",
1717
"description": "Multi-tenant, compliance-ready design that scales to regulated industries and large organizations",
1818
"icon": "fas fa-building",
19-
"link": "/securesbom"
19+
"link": "/securesbom/"
2020
},
2121
{
2222
"title": "Seamless CI/CD Integration",
@@ -28,13 +28,13 @@
2828
"title": "Secure Key Management (Cloud & On-Prem HSM)",
2929
"description": "Support for Hardware Security Modules to protect signing keys in any environment.",
3030
"icon": "fas fa-key",
31-
"link": "/securesbom"
31+
"link": "/securesbom/"
3232
},
3333
{
3434
"title": "Offline & Clean-Room Verification",
3535
"description": "Perform signing and verification in air-gapped or highly regulated environments with full offline support.",
3636
"icon": "fas fa-lock",
37-
"link": "/securesbom"
37+
"link": "/securesbom/"
3838
}
3939
]
4040

0 commit comments

Comments
 (0)