Completed
Response to the Vulnerability in Log4j: Continuously Enhance Community Governanc Capabilities Centering on Vulnerability Awareness, Locating, and Remediation
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
From SBOM to Trusted Software Supply Chain - How Far Are We?
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 What is SBOM?
- 3 SBOM Ecosystem: Dedicated to Standardizing SBOMs and Building a Data Foundation a Secure Software Supply Chain
- 4 Response to the Vulnerability in Log4j: Continuously Enhance Community Governanc Capabilities Centering on Vulnerability Awareness, Locating, and Remediation
- 5 Poisoning Attacks Bring Huge Risks to the Software Supply Chain
- 6 Challenges in the Trustworthy Software Supply Chain Still Persist
- 7 An Overview of Trustworthy Software Supply Chain Solution
- 8 Security Vulnerability Disclosure Models
- 9 Early Awareness of Security Vulnerabilities is Unavailable
- 10 Early Awareness of Critical Vulnerabilities Based on Contrastive Learni
- 11 Early Detection Technology for Security Defect Reports (MemVul)
- 12 Proactive Vulnerability Discovery by Scanning Similar Vulnerability Features
- 13 Correct the Version Information of Software with CVEs
- 14 CVE Fixing Patch Identification
- 15 Locate Components with CVEs
- 16 Package Name Confusion Detection
- 17 Community Monitoring and Risk Control Technologies
- 18 Early Detection of High-Risk Vulnerabilities
- 19 Binary Vulnerability Scanning for Open Source Software
- 20 Effective Malicious Code Identification
- 21 Next Step: Software Asset Management