Educational Series

Software Package Deconstruction

Analyzing Risks To Your Software Supply Chain

Deconstructing Video Conferencing Software: GoToMeeting & BlueJeans

GoToMeeting and BlueJeans Meet are two popular video conferencing tools, relied on by organizations of all sizes for global communication. But what threats and risks are lurking beneath the code? How are these standard tools impacting an enterprise's security posture? What does the code tell us about the build quality and risk profile?

In this episode, Tim Stahl deconstructs these video conferencing tools, exposing the threats hidden within, and discusses how your organization can address these potential threats.

Watch Episode

Deconstructing Enterprise VPNs: SonicWall, Check Point & OpenVPN

Knowing how your VPN tools are constructed, whether they exhibit any suspicious functionality, contain vulnerabilities and outdated components, or represent a risk to the data they are meant to protect is critical. Trust but verify! 

Watch as Tim Stahl  deconstructs these common tools, exposing the threats hidden within, and discusses how your organization can address these potential threats.

Watch Episode

Reducing False Positives in the SOC through Software Analysis

On Demand
Software supply chain analysis can reveal important information that security teams can leverage to tune detections across security solutions before deploying new software. Preventing false positives, and time wasted doing investigations related to expected application behaviors (EDR detections) and network traffic elements, can save significant resources for today’s overworked security teams.
 
Watch Episode

Deconstructing Docker Desktop Software Package

On Demand | Presented on July 13, 2023
In this episode, Tim will take a look at one of the most popular container related applications: Docker Desktop. Container security involves more than containers... it encompasses the tools used to create and manage them. The tools used for any type of development, security or administration functions are often overlooked elements of an enterprise's attack surface.
 
Watch Episode

Deconstructing Crypto-Wallet Software Packages

On Demand | Presented on June 22, 2023
In this episode, Tim will leverage several software supply chain analysis concepts to perform comparisons across similar crypto-wallet software packages, highlighting the risks and threats from within the packages to everyday users. These elements can be used to assess a vendor's overall “build quality” and the level of risk inherent in their software pipeline across products.
 
Watch Episode

Special Reports

The State of Software Supply Chain Security 2024