Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Understanding the SBOM Market Collision
Cybersecurity

Understanding the SBOM Market Collision

Robert WoodBy Robert WoodSeptember 2, 2022Updated:September 12, 20224 Mins Read
Facebook Twitter LinkedIn Email
SBOM Market
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Around 2017, the field of software composition analysis started to really take off. The whole idea was that developers could get insight into the risk posed by the open source library ecosystem they were building upon, the direct dependencies, and the dependencies nested under those. This type of scanning built upon the static code analysis insights that development teams were receiving, looking for bugs in their custom-written code. Composition analysis tools began to differentiate themselves in a few key areas:

  • Ease of integration into the CI/CD process
  • Proprietary vulnerabilities in addition to the public CVEs
  • Language and framework coverage
  • Ability to determine whether the vulnerable code is actually being used

This particular market evolved rapidly with competition between open source projects (OWASP Dependency Check), commercial vendors, and the code management tools like GitHub building native tooling to support.

Market Evolution

Fast forward a few years, Executive Order 14028 started an industry-wide conversation around Software Bill of Materials (SBOM) artifacts, which is effectively a breakdown of the dependencies and build environment that make up a given piece of software. This took place following the industry getting rocked by vulnerabilities like Log4Shell, which was just another widespread issue in the open source library ecosystem.

Similar market dynamics emerged around SBOMs, with open source projects and commercial vendors emerging to contribute to the SBOM conversation. Unlike software composition analysis, there are more layers to the conversation happening around SBOMs. Here are a few particularly interesting dimensions I’ve heard:

  • Integrity signing and verification of different layers of software tying into the Zero Trust conversation
  • Scanning an SBOM for vulnerabilities in the same (or equivalent) way that software composition analysis works
  • Managing SBOMs for software not being written, built, and deployed internally (COTS providers, SaaS tools, etc.)

One of the fascinating things about this market shift is what it does to the existing application security tools and platforms.

Collision in the SBOM Market

Software composition analysis vendors have been expanding their features or consolidating with other vendors to be more inclusive of other dimensions of the application security space. This growth is effectively trying to create the “single pane of glass” application security platform: scanning libraries, custom code, containers, infrastructure as code, integrating with bug trackers, and so on.

On the flip side, the SBOM discussion continues to build momentum and if (more likely when) organizations begin to utilize SBOMs for both internally developed and third-party software. Then, it alleviates some need for software composition analysis in its purest sense. To expand on that last point, even if a security team saw 100% adoption of its SCA tooling by the development teams at its organization, that would still leave all of the SBOMs of COTS tools running across the organization as well as SaaS or PaaS tools running.

The total addressable problem space is larger than the internal development teams and you don’t have the same ability to integrate into a CI/CD pipeline for a third party.

With that said, will the application security platform companies change the way they bundle and license their products? Will they begin to sell access to their data instead of, or on top of, their opinionated toolset?

Questions a CISO Must Ask

These changing market dynamics prompt a number of questions that I believe must be asked while designing and building an application security program. Some of these questions are consistent with other dimensions of the security field while others are more AppSec-specific.

  • Do we plan on ingesting SBOMs from third parties? If so, do we want to manage two different tools for SBOMs and SCA?
  • How important is it that we have one tool or platform to handle many different problems versus a bunch of different tools and providers?
  • Do we plan on building integrations across different phases of the development lifecycle?
  • Do we plan to ingest or report on data being collected from different phases of the development lifecycle?
  • What parts of this process are we comfortable being handled by SaaS solutions versus running it ourselves or using open source?
  • How much adoption can we expect to get from development teams on the security tools we’re purchasing (i.e., number of total code repositories versus number integrated with SCA)?

There is no “right” answer, of course. Every organization and security program has a different and unique context. But thinking through these kinds of questions can help reduce risk or surprises as things unfold.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cybersecurity Featured Post Open-Source Software
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

Bearing Builds on ServiceNow Platform, AI To Transform Physical Security

July 28, 2025

U.K. Government Partners with Google Cloud to Modernize Infrastructure and Upskill 100,000 Workers

July 23, 2025

Microsoft Drives AI and Copilot Functionality Deeper Into Top Security Platforms

July 22, 2025

Microsoft Copilot Enhancements: Intelligent Assistance, Memory, and Mobile Functionality

July 15, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Google Cloud Q2 Surge in Revenue and Backlog Is Microsoft’s Worst Nightmare
  • Bearing Builds on ServiceNow Platform, AI To Transform Physical Security
  • Google Cloud Q2 Boom Shows Big Momentum Among AI-Hungry Customers
  • PwC Updates AI Agent Orchestrator With Support for AWS-Native Services
  • SAP Q2 Results: The Good News, and the Not-As-Good News

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks and Reports

SAP Business Network: A B2B Trading Partner Platform for Resilient Supply Chains

July 10, 2025

Using Agents and Copilots In M365 Modern Work

March 11, 2025

AI Data Readiness and Modernization: Tech and Organizational Strategies to Optimize Data For AI Use Cases

February 21, 2025

Special Report: Cloud Wars 2025 CEO Outlook

February 12, 2025

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }