Software supply chain attacks are uniquely capable of breaching even the most well defended organizations. In fact, they’re purpose built to do so.
They bypass prevention mechanisms that rely on signatures or ML classifiers by abusing the trust granted to the software they’ve compromised. They avoid detection by exhibiting malicious behavior only when it’s too late for remediation.
There’s a reason these attacks are on the rise…they tend to work, and understanding how they work is the first step to stopping them.
In this webinar, two software supply chain security experts, Jasmine Noel and Joshua Knox, offer a crash course on the technical tactics of these types of compromises and demonstrate how to assess the risks posed by open source and commercial software.
Their technical insights and actionable recommendations will enable you to position your organization to handle this growing threat.
✓ How this risk analysis is different from other software testing techniques
Watch On Demand!