The new release of Anchore's software SCM (supply chain management) platform generates an SBOM (software bill of materials) for individual builds and steps in a development cycle, automatically triggering alerts for possible vulnerabilities and risks. Credit: BalanceFormCreative / Shutterstock Anchore has released the latest version of its software SCM (supply chain management) solution, Anchore Enterprise, adding SBOM (software bill of materials) monitoring as an integral part of the platform. The new release, Anchore Enterprise 4.0, adds new SBOM capabilities to identify upstream dependencies in source code repositories and monitor for SBOM drift that can indicate malware or compromised software. An SBOM refers to the list of components (both open-source and proprietary) used in a piece of software. “Anchore Enterprise 4.0 introduces a new capability that will alert users to changes in SBOMs in the build process so that they can be assessed for new risks or malicious activity,” says Rebecca Carter, senior product marketing manager at Anchore. “Of course, some change, or drift, between builds is to be expected, but large changes, especially towards the end of the build cycle, can be an indicator of malicious or at least suspicious activity that should be investigated.” Anchore Enterprise uses vulnerability feeds and a vulnerability-matching algorithm to detect vulnerabilities. It also monitors for malware, cryptominers, secrets, misconfigurations, and other security issues.The Anchore Enterprise 4.0 release promises an end-to-end approach by enabling customers to generate and analyze SBOMs across all steps in the development lifecycle in order to identify and remediate security risks, including vulnerabilities, malware, misconfigurations, and secrets. The new version tracks open source dependencies, SBOM drifts, and application-specific changes. “SBOM generation is an emerging capability available in many software composition analysis (SCA) and software supply chain vendors,” says Sandy Carielli, an analyst at Forrester. “In addition, Anchore seems to be leveraging the SBOM data to perform ongoing risk assessment-the industry is moving in that direction, but Anchore is early.” The Anchore Enterprise 4.0 version has 4 key capabilities: Tracking security profile of open source dependencies: The new feature extends the existing support for container scanning through CI/CD, registries, or Kubernetes (container deployment) to include scanning for direct as well as transitive dependencies in the source code repositories to identify open source vulnerabilities.Tracking SBOM drift to detect suspicious activity: This is a central capability in the new release which allows for tracking changes in the SBOMs in order to identify risks, malware, compromised software, or malicious activities. End-to-End SBOM Management: The new version features a comprehensive SBOM management that includes an SBOM repository generated from each step of the development lifecycle.An application-level view of the software supply chain risk: The new version allows users to tag and group all of the artifacts associated with a particular application, release, or service, enabling identifying and reporting vulnerabilities and risks at an application level.According to Carter, the new features are available via the Anchore UI and can also be managed from third-party applications through the software’s API. Related content news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO CSO and CISO CSO and CISO news Royal family’s website suffers Russia-linked cyberattack Pro-Russian hacker group KillNet took responsibility for the attack days after King Charles condemned the invasion of Ukraine. By Michael Hill Oct 02, 2023 2 mins DDoS Cyberattacks feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Security news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe