June 10, 2024, 2 p.m. | Mitchell Johnson

Sonatype Blog blog.sonatype.com




What if I told you that regardless of how much time, people, and money you invest in your security program, your network is almost certainly exposed to an easily exploitable security hole? The security hole I'm referring to is intentionally malicious components downloaded by your developers directly or via the automated DevOps processes that build your software using the same pipeline required to obtain legitimate open source components. This security hole is easily addressed with a solution like a repository …

components developers exposed malicious may money network people program risk security security program threat

Security Program Manager

@ PwC | Dublin - One Spencer Dock

Risk Services, Digital Audit - Associate / Senior Associate

@ PwC | Singapore - Marina One

Risk Services, Digital Audit - Manager

@ PwC | Singapore - Marina One

Director, Performance Marketing & Revenue Analytics

@ Proofpoint | Sunnyvale, CA

Regulated Data Program Manager - University Information Services – Georgetown University

@ Georgetown University | 2115 Wisconsin Ave 3rd Floor

Security Monitoring and Response Analyst II - (SOC)

@ Mastercard | Pune, India