May 29, 2023, 4:30 a.m. | Help Net Security

Help Net Security www.helpnetsecurity.com

Integrating proprietary and open-source code, APIs, user interfaces, application behavior, and deployment workflows creates an intricate composition in modern applications. Any vulnerabilities within this software supply chain can jeopardize your and your customers’ safety. In this Help Net Security video, Tim Mackey, Head of Software Supply Chain Risk Strategy at Synopsys, discusses supply chain security practices and approaches.


The post CISO-approved strategies for software supply chain security appeared first on Help Net Security.

apis application applications ciso code customers cybersecurity deployment don't miss head help net security hot stuff open source opinion programming risk risk strategy safety security software software supply chain software supply chain risk software supply chain security source code strategy supply supply chain supply chain risk supply chain security synopsys tim tips video vulnerabilities workflows

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Transfer GMP Compliance Officer

@ Pharmathen | Sapes, East Macedonia and Thrace, Greece

Security Cyber Consultant DRC (m/w/d)

@ Atos | Berlin, DE, D-13353

Penetration Tester - InfoSec

@ Rapid7 | NIS Belfast

Cyber Vulnerability Lead

@ Under Armour | Remote, US