what’s in a name? vulnerabilities, sboms, and the challenge of software identity - justin murphy
Published 1 year ago • 400 plays • Length 45:08Download video MP4
Download video MP3
Similar videos
-
17:04
trusted-sbom: on the critical importance of verifying sboms - haoxiang zhang & ahmed e. hassan
-
38:13
what the % is in that sbom? how to provide users what software components are... - helio castro,
-
59:11
webinar: understanding the role of software bill of materials in cybersecurity readiness
-
46:09
an sbom primer: from licenses to security, know what’s in your code... - jeff shapiro & gary o'neall
-
7:48
source code vs binary analysis for sboms
-
40:00
sboms: essential for embedded systems too! - kate stewart, the linux foundation
-
41:32
practical sbom management with zephyr and spdx - benjamin cabé, the linux foundation
-
13:44
i played beginner-level security ctfs for 30 days - here's what i learned
-
9:03
wgel ctf | tryhackme | privilege escalation
-
36:57
lf live webinar: mastering open source management strategies
-
4:41
entrust cybersecurity institute explains: software bill materials (sboms)
-
39:35
sbom ingestion and analysis at new york-presbyterian hospital - katie bratman & adam kojak
-
38:34
every organization needs an sbom, and anchore makes it continuous & automated
-
4:41
sbom explainer: what is sbom? part 1
-
23:41
the common challenges of secure vms - janosch frank, ibm
-
36:51
why you should care about reproducible builds and sbom - jan-simon moeller, the linux foundation
-
39:33
why you should care about reproducible builds and sbom - jan-simon moeller, the linux foundation
-
52:47
is sbom for the cloud even a thing? - nisha kumar, oracle
-
10:24
how to generate an sbom using syft | how vulnerability assessment using a grype in hindi
-
7:53
what is software bill of materials (sbom)?
-
6:50
keynote: software development efforts in honda and its relationship with the open... koichi shimizu