From 755c1ffabe2352af1729c6f418b2bff6e98c6f53 Mon Sep 17 00:00:00 2001 From: Steve Springett Date: Mon, 5 Feb 2024 15:45:08 -0600 Subject: [PATCH] Content update --- CBOM/en/0x20-Use-Cases.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/CBOM/en/0x20-Use-Cases.md b/CBOM/en/0x20-Use-Cases.md index b5183fb..709ed64 100644 --- a/CBOM/en/0x20-Use-Cases.md +++ b/CBOM/en/0x20-Use-Cases.md @@ -14,7 +14,7 @@ and streamlined auditing processes. With CBOM, organizations can effectively saf mitigate risks associated with unauthorized access or misuse, and maintain the integrity and confidentiality of sensitive data across diverse digital environments. -## Identifying Weak Algorithms +## Identifying Weak Cryptographic Algorithms CBOM enables organizations to conduct thorough assessments and discover weak algorithms or flawed implementations that could compromise security. Through analysis of CBOM data, including cryptographic algorithms, key management practices, and usage patterns, organizations can pinpoint areas of concern and prioritize remediation efforts. CBOM facilitates