Supply Chain Attacks and Cloud Native

Supply Chain Attacks and Cloud Native

A Deep Dive Into the Current Runtime Security Landscape - Ankur Kothiwal, CERNПодробнее

A Deep Dive Into the Current Runtime Security Landscape - Ankur Kothiwal, CERN

How Have We Adopted Secure Software Delivery Practices for Fission OSS Serverles... - Sanket SudakeПодробнее

How Have We Adopted Secure Software Delivery Practices for Fission OSS Serverles... - Sanket Sudake

Evaluating runtime threat detection strategies in KubernetesПодробнее

Evaluating runtime threat detection strategies in Kubernetes

Keynote: Open Source Security Is Not A Spectator Sport - Justin Cappos & Santiago Torres AriasПодробнее

Keynote: Open Source Security Is Not A Spectator Sport - Justin Cappos & Santiago Torres Arias

Sponsored Keynote: A Developer’s Guide to Securing Your Software Supply Chain - Toddy MladenovПодробнее

Sponsored Keynote: A Developer’s Guide to Securing Your Software Supply Chain - Toddy Mladenov

EU's Cyber Resilience Act Repercussions in Open SourceПодробнее

EU's Cyber Resilience Act Repercussions in Open Source

Guardians of the Cloud Navigating the Depths of Cloud Threat Hunting - Thomas LaubrockПодробнее

Guardians of the Cloud Navigating the Depths of Cloud Threat Hunting - Thomas Laubrock

SBOMs, Signatures, & Zero Trust: Master Certified Software Supply Chain Security-Practical DevSecOpsПодробнее

SBOMs, Signatures, & Zero Trust: Master Certified Software Supply Chain Security-Practical DevSecOps

CG - Securing Your Cloud-Native DevOps: A Zero Trust ApproachПодробнее

CG - Securing Your Cloud-Native DevOps: A Zero Trust Approach

Safeguarding Cloud Native Supply Chain - Yi Zha & Mostafa RadwanПодробнее

Safeguarding Cloud Native Supply Chain - Yi Zha & Mostafa Radwan

Supply Chain SecurityПодробнее

Supply Chain Security

Breaking the Holy Trinity of Open-Source Ecosystem - Malicious Code in Open-Source PackagesПодробнее

Breaking the Holy Trinity of Open-Source Ecosystem - Malicious Code in Open-Source Packages

Below the Radar: Identifying Hidden Threats Within the Development Ecosystem - Yakir KadkodaПодробнее

Below the Radar: Identifying Hidden Threats Within the Development Ecosystem - Yakir Kadkoda

Invisible Infiltration of AI Supply Chains: Protective Measures from Adversari... Torin van den BulkПодробнее

Invisible Infiltration of AI Supply Chains: Protective Measures from Adversari... Torin van den Bulk

Is the Internet on Fire? Strategies for Mitigating Open Source... Andrew Martin & Michael LiebermanПодробнее

Is the Internet on Fire? Strategies for Mitigating Open Source... Andrew Martin & Michael Lieberman

Keynote: A Vision for a Secure Software Supply Chain - Marina Moore, PhD Candidate, NYUПодробнее

Keynote: A Vision for a Secure Software Supply Chain - Marina Moore, PhD Candidate, NYU

The Runtime Rodeo; Where Open Source Image Behavior Is Tamed - Jimmy Mesta, RAD SecurityПодробнее

The Runtime Rodeo; Where Open Source Image Behavior Is Tamed - Jimmy Mesta, RAD Security

Securing CI/CD Runners Through eBPF Agent - Mert Coskuner, Yahoo & Cenk Kalpakoglu, KonduktoПодробнее

Securing CI/CD Runners Through eBPF Agent - Mert Coskuner, Yahoo & Cenk Kalpakoglu, Kondukto

Tips, Tricks, and Techniques to Ace Supply Chain SecurityПодробнее

Tips, Tricks, and Techniques to Ace Supply Chain Security

Новости