Beyond SBOMs: Runtime Verification for Bulletproof Cloud Supply Chains - 6 de noviembre de 2025 - TecnoWebinars.comAs cloud supply chain attacks escalate in sophistication, traditional SBOMs alone prove insufficient for comprehensive security. While SBOMs provide valuable component inventories, they lack runtime verification capabilities—creating a critical blind spot that malicious actors increasingly exploit. This gap between static analysis and runtime behavior represents one of the most significant vulnerabilities in modern cloud environments. The "Bill of Behavior" (BoB) approach addresses this challenge by providing vendor-supplied profiles of expected runtime behaviors. Generated using eBPF technology, BoBs codify legitimate syscalls, file access patterns and network communications. This enables immediate anomaly detection without custom rule creation, allowing organizations to verify software integrity throughout the supply chain and during execution, dramatically reducing the attack surface while simplifying security operations. Join Dr. Constanze Roedig, Key Researcher at SBA-Research and Founder of Fusioncore.ai, to discover how this emerging standard complements existing SBOM frameworks to create verifiable trust in your cloud ecosystem. Key Takeaways: - Understand how Software Bills of Behavior (SBoBs) create verifiable trust between vendors and clients - Learn practical implementation strategies using existing OCI distribution standards - Discover how BoBs significantly reduce attack surfaces across both runtime and supply chain vectors - Explore immediate benefits of receiving vendor-supplied behavior profiles with software packages - Discover how CNCF Kubescape allows anomaly detection out of the box
| ¿Le gustaría hacer webinars o eventos online con nosotros?
|