Protecting Yourself From Supply Chain Attacks - Trust Is Overrated

Protecting Yourself From Supply Chain Attacks - Trust Is Overrated

BSidesCharm via YouTube Direct link

Conclusion

23 of 24

23 of 24

Conclusion

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Protecting Yourself From Supply Chain Attacks - Trust Is Overrated

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Caffeine
  3. 3 Questioning the Supply Chain
  4. 4 Measuring Caffeine in Coffee
  5. 5 How to Minimize Supply Chain Risks
  6. 6 Linux
  7. 7 Digital Supply Chain
  8. 8 Trust
  9. 9 Real World Attacks
  10. 10 Trusted Platform Module
  11. 11 Defending the Supply Chain
  12. 12 LVFS FWUPD
  13. 13 Inksy
  14. 14 MSI Breach
  15. 15 Black Lotus
  16. 16 FWUPD
  17. 17 Secure Boot
  18. 18 ThirdParty Software
  19. 19 Linux Example
  20. 20 Software Developed Inhouse
  21. 21 Vulnerability Management
  22. 22 Google Java in Python
  23. 23 Conclusion
  24. 24 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.