What is a Botnet? Definition, Examples, How To Prevent
Beyond Identity: Software Supply Chain Attacks and the Best Defence
A software supply chain attack is when someone infiltrates your system by attacking a third-party provider or partner with access to your data.
Recent high-profile supply chain attacks, most notably SolarWinds, has this type of attack into the public eye, and it’s clear that with more suppliers handling sensitive data than ever before, the attack surface of a typical enterprise has been changed dramatically.
In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Suresh Bhandarkar, Director of Product Solution Architecture at Beyond Identity, to discuss:
- Software supply chain attacks
- Weaknesses in the CI/CD pipeline
- The issue of software code provenance
Beyond Identity cuts through the anonymity of to provide a secure, scalable way for development and GitOps teams to immutably sign and verify the author of every commit. Their author verification API in proves that what you’ve shipped is what your developers actually built—and that nothing else got added.
Join 34,209 IT professionals who already have a head start
Meet the panel
Richard Stiennon
Suresh Bhandarkar
Recommended Content
Trending Content
Darktrace Acquired by Private Equity Firm Thoma Bravo in $5 Billion Deal
What is an IoT Attack and How Can you Defend Against it?
What is Data Architecture? Frameworks, Principles, Examples
What is Llama 3? Everything you Need to Know About Meta's New AI