Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      AI and its impact on the developer experience, or ‘where is the joy?’

      July 23, 2025

      Google launches OSS Rebuild tool to improve trust in open source packages

      July 23, 2025

      AI-enabled software development: Risk of skill erosion or catalyst for growth?

      July 23, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Power bank slapped with a recall? Stop using it now – here’s why

      July 23, 2025

      I recommend these budget earbuds over pricier Bose and Sony models – here’s why

      July 23, 2025

      Microsoft’s big AI update for Windows 11 is here – what’s new

      July 23, 2025

      Slow internet speed on Linux? This 30-second fix makes all the difference

      July 23, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Singleton and Scoped Container Attributes in Laravel 12.21

      July 23, 2025
      Recent

      Singleton and Scoped Container Attributes in Laravel 12.21

      July 23, 2025

      wulfheart/laravel-actions-ide-helper

      July 23, 2025

      lanos/laravel-cashier-stripe-connect

      July 23, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      ‘Wuchang: Fallen Feathers’ came close to fully breaking me multiple times — a soulslike as brutal and as beautiful as it gets

      July 23, 2025
      Recent

      ‘Wuchang: Fallen Feathers’ came close to fully breaking me multiple times — a soulslike as brutal and as beautiful as it gets

      July 23, 2025

      Sam Altman is “terrified” of voice ID fraudsters embracing AI — and threats of US bioweapon attacks keep him up at night

      July 23, 2025

      NVIDIA boasts a staggering $111 million in market value per employee — since it became the world’s first $4 trillion company

      July 23, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Tech & Work»SBOMs Without the F-Bombs

    SBOMs Without the F-Bombs

    April 23, 2025

    Software engineers are currently caught between a rock and a hard place. The rock? They’re under record pressure to produce and release new software. The hard place? They’re increasingly expected to account for the safety, security and provenance of every single software asset they use in those builds. That’s demonstrated in the rise of the Software Bill of Materials (SBOM). 

    These two clashing requirements are a source of great anxiety for software engineers, who are now forced to learn a new discipline while being simultaneously expected to do their existing jobs faster. 

    The rise of the SBOM

    SBOMs have risen due to a growing need for transparency in the software development process.

    It’s easy to understand how this has come about. The supply chain clearly needs greater transparency and continues to be the source of much insecurity and technology failure. In August 2024, for example, a faulty update to the widely used Zoom software caused outages for millions of customers, paralyzing businesses and education institutions alike. In January 2025, another faulty update caused outages for many organizational Slack users who found they couldn’t use one of their most fundamental business communication tools.

    As the world becomes more tightly locked in the digital realm, we become ever more vulnerable to risks in the supply chain. Furthermore, there’s a growing body of regulation – including a variety of presidential Executive Orders and National Institute of Standards and Technologies (NIST) guidelines — that compel organizations to account for those risks or face compliance penalties.

    All of this has led to the rise of the SBOM, in which the components and dependencies of a piece of software are catalogued for the inspection of clients, channel partners, regulators and subsequent links in the supply chain. 

    While this is a broadly positive development, it is also a cause of great worry for software engineers who are now being forced to account for every single component used within their releases.

    “That’s not my job”

    It’s important to note that software engineers are not security professionals, but in some important ways, they are now being asked to be.

    Software engineers pick and choose from various third-party and open source components and libraries. They do so — for the most part — with little analysis of the security of those components. Those components can be, or become, vulnerable in a whole variety of ways: Once-reliable code repositories can become outdated or vulnerable, zero days can emerge in trusted libraries, and malicious actors can and often do infect the supply chain. 

    On top of that, risk profiles can change overnight, making what was a well-considered design choice into a vulnerable one almost overnight. Software engineers never before had to consider these things, and yet, the arrival of the SBOM is making them do so like never before. Customers can now scrutinize their releases, and then potentially reject or send them back for fixing – resulting in even more work on short notice and piling on pressure. Even if the risk profile of a particular component changes between the creation of an SBOM and a customer reviewing it, then the release might be rejected. 

    This is understandably the cause of much frustration for software engineers. The structural conditions that are now bearing down on software engineers can’t be dismissed, but they can be accommodated while taking the stress off already-stressed development teams.

    Assisting engineers around the learning curve 

    Principally, software dev teams need to know how the build decisions they make become vulnerable, so they can design with security in mind, and create reliable SBOMs.

    That will mean integrating security insight into the development pipelines that software engineers work within – for example, being able to change and track dependencies so that the dev team will immediately know whether a particular choice will create software failures or security vulnerabilities later down the line. It also will let them know whether the components and libraries they once thought reliable are now vulnerable or outdated. 

    Threat detection scans can add another layer of insight, offering a look at the source code and providing a risk profile of both a release’s behavior and its dependencies. It’s this kind of insight during development that will allow software engineers to climb that steep learning curve that the SBOM presents. It also will furnish those development teams with proof points that they designed a given release securely, even if those releases have since become outdated or vulnerable. That ability to track and catalogue changes in the risk profile of components and dependencies must also extend past dates of release, so that engineers can be involved in the continuing security of their creations.

    SBOMs are here to stay and rightly so. We’ve reached a global level of digital complexity in which we have to know what kinds of components and technologies we’re dealing with at every stage of the supply chain. A lot of that added responsibility is now falling to software engineers and they need ways to ease the mounting pressure. The SBOM shouldn’t be resisted, but it can be accommodated and building SBOM creation tools into the development process can ease that pressure and help engineers adapt to the new reality. 

    The post SBOMs Without the F-Bombs appeared first on SD Times.

    Source: Read More 

    news
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleMicrosoft reveals upcoming changes to Microsoft 365 Developer Program
    Next Article Map Eloquent Attributes into an Object Using the Collection Cast in Laravel 12.10

    Related Posts

    Tech & Work

    AI and its impact on the developer experience, or ‘where is the joy?’

    July 23, 2025
    Tech & Work

    Google launches OSS Rebuild tool to improve trust in open source packages

    July 23, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-53535 – Better Auth Open Redirect Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Community News: Latest PECL Releases (05.20.2025)

    Development

    CVE-2025-49747 – Azure Machine Learning Privilege Escalation

    Common Vulnerabilities and Exposures (CVEs)

    Oblivion Remastered runs a lot better with DLSS 4 enabled — Here’s how to force the override

    News & Updates

    Highlights

    Anthropic MCP Server Flaws: Path Traversal & Symlink Attacks Allow RCE

    July 3, 2025

    Anthropic MCP Server Flaws: Path Traversal & Symlink Attacks Allow RCE

    Image: Cymulate
    Cymulate Research Labs has revealed Anthropic’s Filesystem MCP Server vulnerabilities. Two newly disclosed flaws—CVE-2025-53110 and CVE-2025-53109—exposes systems to unauthorized acces …
    Read more

    Published Date:
    Jul 04, 2025 (3 hours, 35 minutes ago)

    Vulnerabilities has been mentioned in this article.

    CVE-2025-53110

    CVE-2025-53109

    CVE-2025-46647

    DOOM: The Dark Ages gets a brand new trailer at Wrestlemania 41

    DOOM: The Dark Ages gets a brand new trailer at Wrestlemania 41

    April 21, 2025

    CVE-2025-7096 – Comodo Internet Security Premium Manifest File Handler XML Integrity Check Validation Vulnerability

    July 7, 2025

    OpenAI’s most capable models hallucinate more than earlier ones

    April 22, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.