Securing the Software Supply Chain - Go Checksum Database

Securing the Software Supply Chain - Go Checksum Database

USENIX Enigma Conference via YouTube Direct link

Security practices

13 of 15

13 of 15

Security practices

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Securing the Software Supply Chain - Go Checksum Database

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Three supply chain security players
  3. 3 Provenance
  4. 4 Go Modules
  5. 5 Availability
  6. 6 Go Module Proxies and Mirror
  7. 7 Integrity
  8. 8 Merkle trees for accountability
  9. 9 Tiles for caching
  10. 10 The Go Checksum Database
  11. 11 Go build dependencies
  12. 12 Vulnerability tracking
  13. 13 Security practices
  14. 14 Auditing
  15. 15 Questions?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.