Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Understanding the SBOM Market Collision
Cybersecurity

Understanding the SBOM Market Collision

Robert WoodBy Robert WoodSeptember 2, 2022Updated:September 12, 20224 Mins Read
Facebook Twitter LinkedIn Email
SBOM Market
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Around 2017, the field of software composition analysis started to really take off. The whole idea was that developers could get insight into the risk posed by the open source library ecosystem they were building upon, the direct dependencies, and the dependencies nested under those. This type of scanning built upon the static code analysis insights that development teams were receiving, looking for bugs in their custom-written code. Composition analysis tools began to differentiate themselves in a few key areas:

  • Ease of integration into the CI/CD process
  • Proprietary vulnerabilities in addition to the public CVEs
  • Language and framework coverage
  • Ability to determine whether the vulnerable code is actually being used

This particular market evolved rapidly with competition between open source projects (OWASP Dependency Check), commercial vendors, and the code management tools like GitHub building native tooling to support.

Market Evolution

Fast forward a few years, Executive Order 14028 started an industry-wide conversation around Software Bill of Materials (SBOM) artifacts, which is effectively a breakdown of the dependencies and build environment that make up a given piece of software. This took place following the industry getting rocked by vulnerabilities like Log4Shell, which was just another widespread issue in the open source library ecosystem.

Similar market dynamics emerged around SBOMs, with open source projects and commercial vendors emerging to contribute to the SBOM conversation. Unlike software composition analysis, there are more layers to the conversation happening around SBOMs. Here are a few particularly interesting dimensions I’ve heard:

  • Integrity signing and verification of different layers of software tying into the Zero Trust conversation
  • Scanning an SBOM for vulnerabilities in the same (or equivalent) way that software composition analysis works
  • Managing SBOMs for software not being written, built, and deployed internally (COTS providers, SaaS tools, etc.)

One of the fascinating things about this market shift is what it does to the existing application security tools and platforms.

Collision in the SBOM Market

Software composition analysis vendors have been expanding their features or consolidating with other vendors to be more inclusive of other dimensions of the application security space. This growth is effectively trying to create the “single pane of glass” application security platform: scanning libraries, custom code, containers, infrastructure as code, integrating with bug trackers, and so on.

On the flip side, the SBOM discussion continues to build momentum and if (more likely when) organizations begin to utilize SBOMs for both internally developed and third-party software. Then, it alleviates some need for software composition analysis in its purest sense. To expand on that last point, even if a security team saw 100% adoption of its SCA tooling by the development teams at its organization, that would still leave all of the SBOMs of COTS tools running across the organization as well as SaaS or PaaS tools running.

The total addressable problem space is larger than the internal development teams and you don’t have the same ability to integrate into a CI/CD pipeline for a third party.

With that said, will the application security platform companies change the way they bundle and license their products? Will they begin to sell access to their data instead of, or on top of, their opinionated toolset?

Questions a CISO Must Ask

These changing market dynamics prompt a number of questions that I believe must be asked while designing and building an application security program. Some of these questions are consistent with other dimensions of the security field while others are more AppSec-specific.

  • Do we plan on ingesting SBOMs from third parties? If so, do we want to manage two different tools for SBOMs and SCA?
  • How important is it that we have one tool or platform to handle many different problems versus a bunch of different tools and providers?
  • Do we plan on building integrations across different phases of the development lifecycle?
  • Do we plan to ingest or report on data being collected from different phases of the development lifecycle?
  • What parts of this process are we comfortable being handled by SaaS solutions versus running it ourselves or using open source?
  • How much adoption can we expect to get from development teams on the security tools we’re purchasing (i.e., number of total code repositories versus number integrated with SCA)?

There is no “right” answer, of course. Every organization and security program has a different and unique context. But thinking through these kinds of questions can help reduce risk or surprises as things unfold.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cybersecurity Featured Post Open-Source Software
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

ServiceNow, Cisco Integrating Systems to Lock Down AI Apps and Data

May 5, 2025

AI Apps Run Rampant in the Shadows, While Corporate Controls Lag Behind

April 29, 2025

Microsoft’s Controversial Recall Feature Closer to General Availability

April 25, 2025

Google Cloud and UAE Launch Cybersecurity Center to Prevent $6.8B in Losses by 2030

April 25, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Apps Apocalypse: Bill McDermott Joins Satya Nadella in Saying AI Agents Will Crush Applications
  • How Google Cloud Is Leading the AI Revolution Through Customer-Centric Innovation
  • Bill McDermott Channels Satya Nadella: AI Agents Will Turn Apps Into CRUD
  • Microsoft Adopts A2A Protocol, Agentic AI Era Begins
  • AI Agent & Copilot Podcast: Finastra Chief AI Officer Lays Out Range of Use Cases, Microsoft Collaboration

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.