Software Package Deconstruction
Analyzing Risks To Your Software Supply Chain
Analyzing Risks To Your Software Supply Chain
GoToMeeting and BlueJeans Meet are two popular video conferencing tools, relied on by organizations of all sizes for global communication. But what threats and risks are lurking beneath the code? How are these standard tools impacting an enterprise's security posture? What does the code tell us about the build quality and risk profile?
In this episode, Tim Stahl deconstructs these video conferencing tools, exposing the threats hidden within, and discusses how your organization can address these potential threats.
Knowing how your VPN tools are constructed, whether they exhibit any suspicious functionality, contain vulnerabilities and outdated components, or represent a risk to the data they are meant to protect is critical. Trust but verify!
Watch as Tim Stahl deconstructs these common tools, exposing the threats hidden within, and discusses how your organization can address these potential threats.
By using information revealed from a software package analysis, you'll gain insight into a vendor’s CI/CD pipeline, which will enhance your risk assessments and product evaluations by scoring the software vendors themselves.
Get the best of RL Blog delivered to your in-box weekly to stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.