Securing the Software Supply Chain: From Threats to Best Practices

Securing the Software Supply Chain: From Threats to Best Practices

Linux Foundation via YouTube Direct link

Security attacks

14 of 23

14 of 23

Security attacks

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Securing the Software Supply Chain: From Threats to Best Practices

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Agenda
  3. 3 Introductions
  4. 4 About Cloudsmith
  5. 5 About Chain Guard
  6. 6 SolarWinds Attack
  7. 7 What is Software Supply Chain
  8. 8 Software Build Materials
  9. 9 Executive Order 14028
  10. 10 Provenance
  11. 11 Open Source
  12. 12 Trust
  13. 13 Security by default
  14. 14 Security attacks
  15. 15 Lets Encrypt
  16. 16 Cosine
  17. 17 Open source momentum
  18. 18 Shared ecosystem of providence
  19. 19 Meeting users where they are
  20. 20 Conclusion
  21. 21 The Challenge
  22. 22 Cosine and Salsa
  23. 23 Best Practices

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.