Jun LiforJun Li's blogjunli8848.hashnode.net·Jun 11, 2022Zephyr and SBOMReference https://static.sched.com/hosted_files/zephyr2022/34/2022-06-08-Zephyr-SBOM.pdfDiscusszephyr
Nathan TarbertforNathan Tarbertnathantarbert.hashnode.net·Mar 30, 2023SBOM Explained: An enterprise guide to security risk managementIn this age of technology, software companies are quickly shifting towards a strict compliance posture. You may ask yourself, why is that and what has changed over the last several years? This can be due to multiple factors but can mainly be boiled d...Discusssbom
Nathan TarbertforNathan Tarbertnathantarbert.hashnode.net·Mar 30, 2023SBOM Explained: An enterprise guide to security risk managementIn this age of technology, software companies are quickly shifting towards a strict compliance posture. You may ask yourself, why is that and what has changed over the last several years? This can be due to multiple factors but can mainly be boiled d...Discusssbom
Jun LiforJun Li's blogjunli8848.hashnode.net·Jun 11, 2022Zephyr and SBOMReference https://static.sched.com/hosted_files/zephyr2022/34/2022-06-08-Zephyr-SBOM.pdfDiscusszephyr