The Rise of Software Supply-Chain Attacks - How Secure is Your .NET Application

The Rise of Software Supply-Chain Attacks - How Secure is Your .NET Application

NDC Conferences via YouTube Direct link

Intro

1 of 32

1 of 32

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Rise of Software Supply-Chain Attacks - How Secure is Your .NET Application

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 The Rise of Software Supply Chain Attacks
  3. 3 Agenda
  4. 4 Hacking History
  5. 5 Getting connected!
  6. 6 Smashing the Stack...
  7. 7 SQL Injection
  8. 8 Code Red & SQL Slammer
  9. 9 Bill Gates - Email to all MS FTE
  10. 10 Changes in Software Architecture
  11. 11 What is a Supply Chain?
  12. 12 Hacking Hardware
  13. 13 Octopus Scanner - NetBeans
  14. 14 Visual Studio Code
  15. 15 Development Machine
  16. 16 Canonical GitHub Account
  17. 17 Microsoft GitHub Account
  18. 18 Use MFA on source-repository
  19. 19 GIT Commit Signing
  20. 20 EvenStream NPM
  21. 21 Build / Deployment
  22. 22 XCode Ghost
  23. 23 Twilio SDK
  24. 24 Webmin Backdoor
  25. 25 Reproducable/Deterministic Builds
  26. 26 Automotive Industry
  27. 27 Car Supply Chain
  28. 28 Software Bill of Materials (SBOM)
  29. 29 In-Toto - Demo - Terminology
  30. 30 DataDog & In-Toto
  31. 31 Azure Pipelines Artifact Policy
  32. 32 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.