Let’s Talk Software Supply Chains with TAG Security - Michael Lieberman, Kusari
Louisiana woman accused of refusing to return $1.2M after bank error
Keynote: The Next Steps in Software Supply Chain Security - Brandon Lum, Software Engineer, Google
Securing the Software Supply Chain with Open Source - Dan Lorenc, Google
Lightning Talk: My First Supply Chain Security Pull Request as a 13-Year-Old - Neil Naveen
Keynote: Fighting The Next War - Future Threats to OSS and Software Supply Chain... Brian Behlendorf
CNCF Security TAG Supply Chain WG 2021-07-29
How to Use the Railway Wallet | Blockchain Privacy on Ethereum, BNB Chain and Polygon | Tutorial
Keynote: Why Developer Laptop Security is Key to Securing Your CI/CD Pipeline - Jeremy Colvin
How to Secure Your Supply Chain at Scale - Hemil Kadakia & Yonghe Zhao, Yahoo
Asking the Right Questions to Coordinate Security in the Supply Chain
SBOM: Software and Supply Chain Security | AISS 2022
Using CNCF Best Practices for Software Supply Chain to Guide and Enha... Ryan Gibbons & Conor Rogers
What is a Data Center?
VLAN Explained
Securing the Supply Chain with Witness - Cole Kennedy, TestifySec
OmniBOR: Bringing the Receipts for Supply Chain Security - Frederick Kautz, SPIFFE/SPIRE
Securing the Supply Chain with SLSA - Matthew Suozzo | PackagingCon 2021
7 Signs Someone Is Spying on your Phone & How to STOP IT
What is MQTT Protocol ? How it works ? | 2022