Completed
How can we protect ourselves from supply chain attacks?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Practical Approach to Automate the Discovery and Eradication of Open-Source Software Vulnerabilities
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 The Benefits of Open Source Software
- 3 Open source security is a strange thing
- 4 Typo squatting
- 5 Package Masking
- 6 Ownership transfer
- 7 Dangling references
- 8 Picking a target for infection
- 9 How dependencies gets infected?
- 10 How can we protect ourselves from supply chain attacks?
- 11 Netflix Microservice Architecture
- 12 Design principles for our approach
- 13 Build open source vulnerability database
- 14 Vulnerability Triage
- 15 Risk Strategy Table - Example 1
- 16 Requirements for effective vulnerability remediation
- 17 Understanding minimum version update problem
- 18 First order dependency problem
- 19 Yarn Selective dependency resolutions - Example
- 20 Dependency lock updates
- 21 Security Change Campaigns
- 22 Security Change Campaign - Blacklist
- 23 Vulnerable method use detection
- 24 Better remediation (slack bot remediation)
- 25 Questions we ask for organizational metrics
- 26 Blackhat sound bytes