Completed
Log for Shell
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Open Source Supply Chain Threat Landscape - A Moving Target
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Context
- 3 Supply Chain
- 4 Edward Reever
- 5 Chevy Cobalt
- 6 Boeing 787
- 7 Lettuce
- 8 Old School Vulnerabilities
- 9 First Vulnerabilities
- 10 Shell Shock Heartbleed
- 11 Commons Collection
- 12 Log for Shell
- 13 China
- 14 National Security Agency
- 15 New Rise of Open Source
- 16 typo squatting attacks
- 17 evolution of attacks
- 18 attacks on developers
- 19 Jenkins
- 20 Vercata
- 21 Code Cub
- 22 Inversion
- 23 White Hat Research
- 24 Bug Bounties
- 25 The attackers are still focused
- 26 Global drug trade 2016
- 27 VC funds investing in attackers
- 28 Theyre looking for the easy way
- 29 For the attackers right now
- 30 This rise is not a coincidence
- 31 Credit card fraud detection
- 32 What do we do about it
- 33 They were freaking out
- 34 Theyre amateurs
- 35 Fix Open Source
- 36 Takata Airbag
- 37 JYear on View
- 38 Vulnerability Analysis
- 39 Solving 4 of the Problem
- 40 The Good News
- 41 The Point
- 42 You have a supply chain
- 43 How to avoid the next malicious release
- 44 Factory Deming principles
- 45 Security is most important
- 46 People are faster and more secure
- 47 Conclusion