Posted on
in Presentations
The presenters will examine a recent case to show how fraudsters and foreign adversaries use phishing redirects, payload drops, crypto-mining, keylogging and bloatware to infiltrate social media, apps and news sites. The goal is to underscore the urgent need to hold to account third-party code suppliers, who know our and our children’s behaviors, preferences, and other sensitive information.
Pre-Requisites: Understanding of website operations. DevSecOps and app/sec experience helpful.
Pre-Requisites: Understanding of website operations. DevSecOps and app/sec experience helpful.
Protecting Data & the Supply Chain Ecosystem DevSecOps & Application Security
anti-malware DevSecOps data security data loss prevention application security
Topic
Protecting Data & the Supply Chain Ecosystem
DevSecOps & Application Security
Subtopic
anti-malware
DevSecOps
data security
data loss prevention
application security
Share With Your Community