Foundry. Formerly IDG Communications. Foundry. Formerly IDG Communications.
  • In-Person Events
    • FutureIT Series
    • CIO100 Symposium & Awards
    • CSO50 Conference + Awards
    • Dinners
    • Keynotes & Cocktails
  • Virtual Events
    • Summits
    • Roundtables + Custom events
  • Leadership events + Awards
  • Sponsorship
  • Contact

Protecting Against Next-Gen Software Supply Chain Attacks

Ax Sharma, Developer Advocate, Sonatype
Michelle Dufty, Senior Vice President of Marketing, Sonatype

Legacy software supply chain exploits, like the Struts incident at Equifax, prey on publicly disclosed open source vulnerabilities left unpatched in the wild. Conversely, next-generation software supply chain attacks are far more sinister because bad actors aren’t waiting for public vulnerability disclosures. Instead, they’re actively injecting malicious code into open source projects that feed the global supply chain. Join us to learn how your organization can proactively protect itself against software supply chain attacks.

Wish to attend an upcoming event as a participant?
Get in touch.

Sign up now

CONTACT

Debra Becker
Senior Marketing Director, Foundry North America Events
debra_becker@foundryco.com

 

Connect

Get the latest updates at #CIO

Follow

twitter facebook linkedin
Foundry. Formerly IDG Communications
© 2023 IDG All Rights Reserved
Privacy Policy
CIO, Computerworld, CSO, InfoWorld, Networkworld