mlns='http://www.w3.org/1999/xhtml'>
We’ll examine the weaknesses in software supply chains
John, until the recent SolarWinds compromise, the conversation around supply chains – and more importantly, their vulnerabilities – was rarely discussed in the cybersecurity industry. However, over the last few years, supply chains have become an increasingly lucrative target for hackers. And when the core software supply chain itself is compromised, the results are often catastrophic. In this webinar, we’ll examine the weaknesses in software supply chains and what organizations should consider to protect themselves from malicious attacks. Attend this webinar and you'll learn: How software development has changed – and how its opened up new vulnerabilities Types of attacks on software supply chains The pros and cons of open source software Examples of software supply chain attacks and how they could’ve been prevented And much more |
|
|
|
Sean Wright Lead Application Security SME Immersive Labs |
|
|
|
|