Generate Cyclone DX SBOMs as part of your next build
SBOMs are automatically sent to Dependency Track and scanned for vulnerabilities
Software Supply Chain
More Important Than Ever
Embedded firmware increasingly relies on combinations of open source, commercial software packages, outsourcing, and in-house software.
It is increasingly difficult to determine what software packages are included in a build because so much code is externally sourced.
The U.S. Government's’ executive order 14028 states that federal agencies should require SBOMs, and NIST/CISA/NTIA recommends that all industries automate vulnerability scanning thereof.
BG Networks’ Commitment to Open Source
BG Networks is committed to contributing open-source software to help developers get started with IoT cybersecurity and make implementing cybersecurity easier.
We believe that open-source removes barriers to implementing cybersecurity in more devices.
SBOM and Vulnerability Database Resources
Consulting Services BG Networks can help with your software vulnerability analysis.
We offer a complete set of Consulting Services for IoT device cybersecurity. These include risk/threat/vulnerability analysis, definition of cybersecurity requirements, development of software, and testing.