Completed
Dependency lock updates
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Practical Approach to Automate the Discovery and Eradication of Open-Source Software Vulnerabilities
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 The Benefits of Open Source Software
- 3 Open source security is a strange thing
- 4 Typo squatting
- 5 Package Masking
- 6 Ownership transfer
- 7 Dangling references
- 8 Picking a target for infection
- 9 How dependencies gets infected?
- 10 How can we protect ourselves from supply chain attacks?
- 11 Netflix Microservice Architecture
- 12 Design principles for our approach
- 13 Build open source vulnerability database
- 14 Vulnerability Triage
- 15 Risk Strategy Table - Example 1
- 16 Requirements for effective vulnerability remediation
- 17 Understanding minimum version update problem
- 18 First order dependency problem
- 19 Yarn Selective dependency resolutions - Example
- 20 Dependency lock updates
- 21 Security Change Campaigns
- 22 Security Change Campaign - Blacklist
- 23 Vulnerable method use detection
- 24 Better remediation (slack bot remediation)
- 25 Questions we ask for organizational metrics
- 26 Blackhat sound bytes