RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research
Why RL Built Spectra Assure Community
April 14, 2026

Why RL Built Spectra Assure Community

We set out to help dev and AppSec teams secure the village: OSS dependencies, malware, more. Learn how.

Read More about Why RL Built Spectra Assure Community
Why RL Built Spectra Assure Community

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
Products & TechnologyMarch 10, 2022

Not all SBOMs Are the Same. Choose Wisely!

The importance of generating SBOM data for responding to newly reported vulnerabilities and software supply chain attacks only grows.

jasmine noel black and white headshot
Jasmine Noel, Senior Product Marketing Manager at ReversingLabs.Jasmine Noel
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
Not all SBOMs Are the Same. Choose Wisely!

Software Bills of Materials (SBOMs) are top of mind for most organizations, with 78% of them expecting to produce or consume SBOMs[1]. This is not surprising as the visibility provided by comprehensive SBOM makes it easier to answer the questions such as: “What’s the minimum number of libraries we must update to get rid of the Apache log4j vulnerability?”

Since over half of enterprise executives expect software supply chain related incidents to increase in 2022[2], getting SBOMs that are usable for incident response and prevention will only grow in importance. As software producing organizations evaluate technology to generate their SBOMs, this infographic explores items to consider, why those considerations matter and the benefits of using a modern approach for generating SBOMs.

Not all SBOMs are created equal – Top considerations when evaluating software bill of materials. Download infographic.

List of Top SBOM Considerations

1: Completeness matters when responding to new risks
Modern software can be a rat's nest of third-party, open source, and statically linked packages and dependencies that are many layers deep. Consider that research shows when installing an average npm package, a user implicitly trusts approximately 80 other packages due to transitive dependencies[3]. When looking for components with newly reported vulnerabilities you’ll need visibility into every layer and dependency. SBOMs that haven’t exposed every layer will "leave you with a risk that could have been avoided."

2: Accuracy matters when you are trying reduce software bloat
Reducing the number and variety of components and libraries can significantly improve software security. Missing or incorrect naming, version and publisher information in a SBOM makes it very difficult to rationalize and reduce the use of multiple versions of the same component within a single application (i.e. software bloat). Verification checks during SBOM generation can help ensure that each component in the software is what the SBOM says it is.

3: Understanding “software as delivered” matters when trying to identify malicious changes
Illicit changes to a software producer’s build infrastructure or to binaries being generated can enable attacks on customer networks, the most well-known example being Solarwinds. These changes are essentially invisible to development teams without a pre-release security assessment. Similarly a number of other items are often packaged with the software to assist with installation: installer software, separate installation libraries, or even an entire container. Vulnerabilities or tampering within these items can introduce the same security risks. The SBOM created during the final build (i.e.“Software as built”) will not list these components, leaving organizations blind to the risks. “Software as delivered” – the binary and packaging – is what matters from a security standpoint.

4: Integrated risk analysis matters when trying to automate new security practices into software development lifecycle (SDLC) or devops pipelines.
A list of what’s in your software is great, but having component data linked to other information makes it more actionable by development teams. Automated binary analysis of each component, as it’s found and listed in your SBOM, can deliver:

  • A software quality grade for each component so you know at a glance where major issues need remediation
  • Insight into indicators of supply chain compromise, such as software tampering, malware, ineffective mitigations or certificate signing issues
  • Remediation advice and prioritization that helps teams focus on the most important software security improvements

References
[1] linuxfoundation.org
[2] www.pwc.com
[3] usenix.org



Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.


Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Products & Technology

More Blog Posts

Retrohunting Telegram Bots

Spectra Analyze in Action: Retrohunting Bots

Learn how to use ReversingLabs’ Spectra Analyze to expand your detection of malicious Telegram C2 bots.

Learn More about Spectra Analyze in Action: Retrohunting Bots
Spectra Analyze in Action: Retrohunting Bots
QR Code Phishing Is Evolving: Here’s How Your Detection Can Keep Up

QR Code Phishing Evolves: How to Keep Up

Here's what you need to know about the rise of quishing — and how your threat hunting team can get out in front of it.

Learn More about QR Code Phishing Evolves: How to Keep Up
QR Code Phishing Evolves: How to Keep Up
Why RL Built Spectra Assure Community

Why RL Built Spectra Assure Community

We set out to help dev and AppSec teams secure the village: OSS dependencies, malware, more. Learn how.

Learn More about Why RL Built Spectra Assure Community
Why RL Built Spectra Assure Community
How a Simple YARA Rule Catches What AV Misses

ClickFix: YARA Rules Catch What AV Misses

Learn about the antivirus detection gap — and how to develop a simple YARA rule using Spectra Analyze.

Learn More about ClickFix: YARA Rules Catch What AV Misses
ClickFix: YARA Rules Catch What AV Misses

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top