all InfoSec news
CISO-approved strategies for software supply chain security
Help Net Security www.helpnetsecurity.com
Integrating proprietary and open-source code, APIs, user interfaces, application behavior, and deployment workflows creates an intricate composition in modern applications. Any vulnerabilities within this software supply chain can jeopardize your and your customers’ safety. In this Help Net Security video, Tim Mackey, Head of Software Supply Chain Risk Strategy at Synopsys, discusses supply chain security practices and approaches.
The post CISO-approved strategies for software supply chain security appeared first on Help Net Security.
apis application applications ciso code customers cybersecurity deployment don't miss head help net security hot stuff open source opinion programming risk risk strategy safety security software software supply chain software supply chain risk software supply chain security source code strategy supply supply chain supply chain risk supply chain security synopsys tim tips video vulnerabilities workflows