Completed
Security attacks
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Securing the Software Supply Chain: From Threats to Best Practices
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Agenda
- 3 Introductions
- 4 About Cloudsmith
- 5 About Chain Guard
- 6 SolarWinds Attack
- 7 What is Software Supply Chain
- 8 Software Build Materials
- 9 Executive Order 14028
- 10 Provenance
- 11 Open Source
- 12 Trust
- 13 Security by default
- 14 Security attacks
- 15 Lets Encrypt
- 16 Cosine
- 17 Open source momentum
- 18 Shared ecosystem of providence
- 19 Meeting users where they are
- 20 Conclusion
- 21 The Challenge
- 22 Cosine and Salsa
- 23 Best Practices