In today’s world, to survive and compete effectively, IT leaders are hiring armies of software developers, consuming massive amounts of open source and embracing DevOps to automate and optimize the entire software development lifecycle.
Do CISOs and application security professionals have visibility into the open source being used? Furthermore, what automated security processes can be initiated when a new breach is announced?
Threat actors have recognized the power of open source and are now beginning to create their own attack opportunities. This new form of assault, where OSS project credentials are compromised and malicious code is intentionally injected into open source libraries, allows hackers to poison the well.
Join this webinar where a panel of experts will discuss the tactics businesses can deploy to best defend against these open source threats.
Key takeaways:
- Analyze and detail the events leading to recent ‘all-out’ attack on the OSS industry
- How to automatically identify open source risk and remediate known vulnerabilities
- Empower developers to protect themselves and the millions of people depending on them