The Rise of Software Supply-Chain Attacks - How Secure is Your .NET Application

The Rise of Software Supply-Chain Attacks - How Secure is Your .NET Application

NDC Conferences via YouTube Direct link

Intro

1 of 26

1 of 26

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Rise of Software Supply-Chain Attacks - How Secure is Your .NET Application

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 The Rise of Software Supply Chain Attacks
  3. 3 Agenda
  4. 4 Hacking History
  5. 5 Code Red & SQL Slammer
  6. 6 Bill Gates - Email to all MS FTE
  7. 7 Changes in Software Architecture
  8. 8 What is a Supply Chain?
  9. 9 Hacking Hardware
  10. 10 Octopus Scanner - NetBeans
  11. 11 Visual Studio Code
  12. 12 Development Machine
  13. 13 Canonical GitHub Account
  14. 14 Microsoft GitHub Account
  15. 15 Use MFA on source-repository
  16. 16 GIT Commit Signing
  17. 17 Build / Deployment
  18. 18 Twilio SDK
  19. 19 Webmin Backdoor
  20. 20 SolarWinds Sunspot
  21. 21 Reproducable/Deterministic Builds
  22. 22 Automotive Industry
  23. 23 Car Supply Chain
  24. 24 DataDog & In-Toto
  25. 25 Azure Pipelines Artifact Policy
  26. 26 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.