<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Securing the Software Supply Chain in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Securing-the-Software-Supply-Chain/m-p/64401#M6493</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Today, CISA, the National Security Agency (NSA), and partners released &lt;A title="Recommended Practices for Software Bill of Materials Consumption" href="https://media.defense.gov/2023/Nov/09/2003338086/-1/-1/0/SECURING%20THE%20SOFTWARE%20SUPPLY%20CHAIN%20RECOMMENDED%20PRACTICES%20FOR%20SOFTWARE%20BILL%20OF%20MATERIALS%20CONSUMPTION.PDF" target="_blank"&gt;Securing the Software Supply Chain: Recommended Practices for Software Bill of Materials Consumption&lt;/A&gt;. Developed through the Enduring Security Framework (ESF), this guidance provides software developers and suppliers with industry best practices and principles, including managing open source software and software bills of materials (SBOM), to maintain and provide awareness about the security of software.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisa.gov/news-events/alerts/2023/11/09/cisa-nsa-and-partners-release-new-guidance-securing-software-supply-chain" target="_blank"&gt;https://www.cisa.gov/news-events/alerts/2023/11/09/cisa-nsa-and-partners-release-new-guidance-securing-software-supply-chain&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
    <pubDate>Thu, 09 Nov 2023 20:32:06 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2023-11-09T20:32:06Z</dc:date>
    <item>
      <title>Securing the Software Supply Chain</title>
      <link>https://community.isc2.org/t5/Industry-News/Securing-the-Software-Supply-Chain/m-p/64401#M6493</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Today, CISA, the National Security Agency (NSA), and partners released &lt;A title="Recommended Practices for Software Bill of Materials Consumption" href="https://media.defense.gov/2023/Nov/09/2003338086/-1/-1/0/SECURING%20THE%20SOFTWARE%20SUPPLY%20CHAIN%20RECOMMENDED%20PRACTICES%20FOR%20SOFTWARE%20BILL%20OF%20MATERIALS%20CONSUMPTION.PDF" target="_blank"&gt;Securing the Software Supply Chain: Recommended Practices for Software Bill of Materials Consumption&lt;/A&gt;. Developed through the Enduring Security Framework (ESF), this guidance provides software developers and suppliers with industry best practices and principles, including managing open source software and software bills of materials (SBOM), to maintain and provide awareness about the security of software.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisa.gov/news-events/alerts/2023/11/09/cisa-nsa-and-partners-release-new-guidance-securing-software-supply-chain" target="_blank"&gt;https://www.cisa.gov/news-events/alerts/2023/11/09/cisa-nsa-and-partners-release-new-guidance-securing-software-supply-chain&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 20:32:06 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Securing-the-Software-Supply-Chain/m-p/64401#M6493</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-11-09T20:32:06Z</dc:date>
    </item>
    <item>
      <title>Re: Securing the Software Supply Chain</title>
      <link>https://community.isc2.org/t5/Industry-News/Securing-the-Software-Supply-Chain/m-p/64406#M6495</link>
      <description>Good document - however I wonder what the high scores will be on the Vulnerability Exchange(VEX)?&lt;BR /&gt;&lt;BR /&gt;One year old, two year old will anyone go three years and above asserting not vulnerable?</description>
      <pubDate>Thu, 09 Nov 2023 23:57:45 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Securing-the-Software-Supply-Chain/m-p/64406#M6495</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2023-11-09T23:57:45Z</dc:date>
    </item>
    <item>
      <title>Re: Securing the Software Supply Chain</title>
      <link>https://community.isc2.org/t5/Industry-News/Securing-the-Software-Supply-Chain/m-p/77342#M7386</link>
      <description />
      <pubDate>Mon, 24 Feb 2025 16:23:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Securing-the-Software-Supply-Chain/m-p/77342#M7386</guid>
      <dc:creator>Moiz</dc:creator>
      <dc:date>2025-02-24T16:23:16Z</dc:date>
    </item>
  </channel>
</rss>

