Hardening Your Soft Software Supply Chain
Offered By: Pluralsight
Course Description
Overview
This talk will help you gain a better understanding of what you can do for supply chain security for your organization, the projects you depend on, and the projects you maintain.
Software supply chain threats are real. As more developers and companies rely on open-source code that anyone can contribute to, this opens the door to a new vector of attack. There are increasing supply chain compromises, which successfully sneak in new backdoored packages, use typosquatting, or even compromise build tooling and signing keys. What's actually happening in the wild? How do you determine your dependencies and properly secure yourself? In this session, you'll learn about common kinds of supply chain attacks and when they’re likely to occur. You'll also hear about what you can do to determine your dependencies, track metadata, and be notified of new security patches you should apply, including best practice. This talk will help you gain a better understanding of what you can do for supply chain security for your organization, the projects you depend on, and the projects you maintain.
Software supply chain threats are real. As more developers and companies rely on open-source code that anyone can contribute to, this opens the door to a new vector of attack. There are increasing supply chain compromises, which successfully sneak in new backdoored packages, use typosquatting, or even compromise build tooling and signing keys. What's actually happening in the wild? How do you determine your dependencies and properly secure yourself? In this session, you'll learn about common kinds of supply chain attacks and when they’re likely to occur. You'll also hear about what you can do to determine your dependencies, track metadata, and be notified of new security patches you should apply, including best practice. This talk will help you gain a better understanding of what you can do for supply chain security for your organization, the projects you depend on, and the projects you maintain.
Taught by
DevSecCon
Related Courses
Enterprise Linux SecurityYouTube