Attackers are increasingly using indirect methods to exploit software, compromising both direct and indirect open-source dependencies. This can lead to dangerous attacks and breaches in software security. This session delves into the fundamentals of supply chain attacks and how organizations can leverage open-source software to defend against supply chain attacks and zero-day exploits.
Topics Covered: