We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent f0a9a7c commit 755c1ffCopy full SHA for 755c1ff
CBOM/en/0x20-Use-Cases.md
@@ -14,7 +14,7 @@ and streamlined auditing processes. With CBOM, organizations can effectively saf
14
mitigate risks associated with unauthorized access or misuse, and maintain the integrity and confidentiality of sensitive
15
data across diverse digital environments.
16
17
-## Identifying Weak Algorithms
+## Identifying Weak Cryptographic Algorithms
18
CBOM enables organizations to conduct thorough assessments and discover weak algorithms or flawed implementations that
19
could compromise security. Through analysis of CBOM data, including cryptographic algorithms, key management practices,
20
and usage patterns, organizations can pinpoint areas of concern and prioritize remediation efforts. CBOM facilitates
0 commit comments