Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

European Commission Confirms Data Breach After AWS Account Hack

March 28, 2026

Cybertech Weekly: Top Highlights and Trends

March 27, 2026

European Commission Web Hosts Hit by Major Data Breach

March 27, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » BlueVoyant Adds SBOM Features to Enhance Third-Party Cyber Risk Management
Uncategorized

BlueVoyant Adds SBOM Features to Enhance Third-Party Cyber Risk Management

Staff WriterBy Staff WriterJune 5, 2025No Comments4 Mins Read7 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


BlueVoyant, the leader in integrated cybersecurity, launched its Software Bill of Materials (SBOM) management offering, which helps organizations reduce risk related to software by automating the ingestion, analysis, and tracking of software component information from third-party software vendors. The latest advancements enhance Supply Chain Defense, BlueVoyant’s next-generation third-party cyber risk management solution that continuously monitors suppliers, vendors, and other third parties, and then works with them to quickly remediate threats. BlueVoyant’s SBOM solution is powered through a partnership with Manifest, a cybersecurity company that specializes in securing software supply chains for corporate and government entities.

More than 85% of applications contain at least one software vulnerability, according to the Open Source Software Risk Analysis (OSSRA) Report. Yet, many organizations lack visibility into software design or an efficient way to assess and manage third-party SBOM information, which can leave them open to breaches, business interruption, and regulatory compliance issues. As a result, organizations are looking for solutions.

Cyber Technology Insights : BlueVoyant Unveils New Enterprise Cybersecurity Solution to Strengthen Cyber Defense and Manage Costs

By leveraging the BlueVoyant-Manifest SBOM solution, security teams can proactively gain deep insights into software risk exposure and other dependencies that their businesses may rely on.

“By combining Manifest’s depth of experience in SBOM with BlueVoyant’s holistic Supply Chain Defense, clients get continuous monitoring and remediation to solve their biggest third-party cybersecurity challenges,” said Marc Frankel, CEO and co-founder of Manifest.

The key benefits to utilizing SBOM for third-party risk are:

Vendor risk management: Automatically solicit SBOMs from vendors, see intuitive risk levels for vendor products, and incorporate them into comprehensive third-party cyber risk management

Smarter vulnerability management: Prioritize vulnerabilities quickly, and triage issues to reduce false positives and avoid unnecessary mitigation work

Open Source Software (OSS) risk management: Create an enterprise-wide inventory of OSS across first and third-party products, and scan OSS repositories to assess risk before implementing them

Simplified compliance: Easily demonstrate compliance and provide evidence for international regulations and standards such as R155, Executive Order 14028, Section 524B, the European Cyber Resilience Act, and the EU’s NIS2 and DORA

“Organizations in the private and public sectors are realizing that SBOM visibility is a crucial part of a proactive third-party cyber risk management program,” said Joel Molinoff, global head of Supply Chain Defense at BlueVoyant. “By enhancing BlueVoyant’s Supply Chain Defense with Manifest’s SBOM capabilities, our clients are expanding their risk visibility deeper into the software supply chain and ensuring continuous monitoring and remediation of critical threats.”

Cyber Technology Insights : BlueVoyant’s Supply Chain Risk Solutions Now Available on GSA’s $919 Million SCRIPTS BPA Via Carahsoft

BlueVoyant’s Supply Chain Defense has garnered multiple industry awards. This year it was named a winner in the Cybersecurity Excellence Awards for Supply Chain and a finalist in the SC Awards for Best Supply Chain Security. Additionally, BlueVoyant was recognized in the 2025 Gartner® Market Guide for Third-Party Risk Management Technology Solutions published May 2025 by Antonia Donaldson, Luke Ellery, et al.

Supply Chain Defense is part of the BlueVoyant Cyber Defense Platform, which provides holistic cyber defense by helping clients to detect, investigate, and mitigate threats from internal, external, and third-party ecosystems in one cloud-native platform.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Cyber Technology Insights : BlueVoyant Appoints Michael Montoya as COO

To participate in our interviews, please write to our CyberTech Media Room at sudipto@intentamplify.com

Source: PR Newswire



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleBackdoored Malware Repositories: A Trap for Novice Cybercriminals
Next Article FBI Alerts: 900 Organizations Targeted by Play Ransomware
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Russian Hacker Gets 2 Years for TA551 Botnet Ransomware Attacks

March 26, 2026

The Kill Chain Is Obsolete When Your AI Agent Becomes the Threat

March 25, 2026

LeakBase Admin Nabbed in Russia for Massive Credential Marketplace

March 25, 2026
Leave A Reply Cancel Reply

Latest Posts

European Commission Confirms Data Breach After AWS Account Hack

March 28, 2026

European Commission Web Hosts Hit by Major Data Breach

March 27, 2026

RSAC: Uniting Cybersecurity Insights, Innovation, and Community

March 27, 2026

Security Leaders Foresee the Next Two Years as ‘Insane’

March 27, 2026
Don't Miss

Russian Hacker Gets 2 Years for TA551 Botnet Ransomware Attacks

By Staff WriterMarch 26, 2026

Top Highlights A Russian national, Ilya Angelov, was sentenced to two years in prison and…

The Kill Chain Is Obsolete When Your AI Agent Becomes the Threat

March 25, 2026

LeakBase Admin Nabbed in Russia for Massive Credential Marketplace

March 25, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • European Commission Confirms Data Breach After AWS Account Hack
  • Cybertech Weekly: Top Highlights and Trends
  • European Commission Web Hosts Hit by Major Data Breach
  • RSAC: Uniting Cybersecurity Insights, Innovation, and Community
  • Security Leaders Foresee the Next Two Years as ‘Insane’
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

European Commission Confirms Data Breach After AWS Account Hack

March 28, 2026

Cybertech Weekly: Top Highlights and Trends

March 27, 2026

European Commission Web Hosts Hit by Major Data Breach

March 27, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202629 Views

The New Face of DDoS is Impacted by AI

August 4, 202523 Views

Absolute Launches GenAI Tools to Tackle Endpoint Risk

August 7, 202515 Views

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.