Discover the new cybersecurity landscape of the interconnected software supply chain


In Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran information security professionals delivers an expert treatment of software supply chain security. In the book, you’ll explore real-world examples and guidance on how to defend your own organization against internal and external attacks. It includes coverage of topics including the history of the software transparency movement, software bills of materials, and high assurance attestations.


The authors examine the background of attack vectors that are becoming increasingly vulnerable, like mobile and social networks, retail and banking systems, and infrastructure and defense systems.


You’ll also discover:

  • Use cases and practical guidance for both software consumers and suppliers
  • Discussions of firmware and embedded software, as well as cloud and connected APIs
  • Strategies for understanding federal and defense software supply chain initiatives related to security


An essential resource for cybersecurity and application security professionals, Software Transparency will also be of extraordinary benefit to industrial control system, cloud, and mobile security professionals.


Contents

Chapter 1 Background on Software Supply Chain Threats

Chapter 2 Existing Approaches—Traditional Vendor Risk Management

Chapter 3 Vulnerability Databases and Scoring Methodologies

Chapter 4 Rise of Software Bill of Materials

Chapter 5 Challenges in Software Transparency

Chapter 6 Cloud and Containerization

Chapter 7 Existing and Emerging Commercial Guidance

Chapter 8 Existing and Emerging Government Guidance

Chapter 9 Software Transparency in Operational Technology

Chapter 10 Practical Guidance for Suppliers

Chapter 11 Practical Guidance for Consumers

Chapter 12 Software Transparency Predictions


Review

"Starting this book off with a proper threat model is precisely what’s needed as a frame for such an important problem. Supply chain risk is complicated, it’s changing quickly, and the defensive measures often involve multiple teams which drives up the complexity. The insights captured throughout this book are absolutely necessary for the state of software security today and having the proper context and frame of the problem space as you read it will help get the most of it."

― Robert Wood, CISO of Centers for Medicare and Medicaid (CMS)


About the Author

CHRIS HUGHES is the co-founder and Chief Information Security Officer of Aquia. He is an Adjunct Professor for M.S. Cybersecurity programs at Capitol Technology University and the University of Maryland Global Campus, and a co-host of the Resilient Cyber Podcast.

TONY TURNER has 25 years’ experience as a cybersecurity engineer, architect, consultant, executive, and community builder. He is the Founder of Opswright, a software company creating solutions for security engineering in critical infrastructure and leads the OWASP Orlando chapter.

ISBN

9781394158485

برند

Wiley

تعداد صفحات

332

سال

2023

course image

ایزی اگزم

90%رضایت مشتریان عملکرد عالی

نام مولف:

John Priece

نام ناشر:

Wiley

موجود نیست

متأسفانه این محصول در حال حاضر موجود نمی باشد