Posted on
in Presentations
Today's relatively simple applications are often duct-taped together by hundreds of different libraries with external APIs and code loaded at run time. Attacks against this fragile software supply chain are becoming very common. We will show in an interactive attack/defend session how the current attacks against these applications work, and how to correctly apply the defenses against them.
Cloud Security DevSecOps & Application Security
cloud security DevSecOps hackers & threats secure coding supply chain
Topic
Cloud Security
DevSecOps & Application Security
Subtopic
cloud security
DevSecOps
hackers & threats
secure coding
supply chain
Share With Your Community