This year, we’ve seen some of the most sophisticated software supply chain attacks launched by cybercriminals and adversaries affecting public and private companies across the globe.
Open source fuels software supply chains however these attacks are successful because they target vulnerabilities that can lie within open source.
With 21,000+ new open source projects being released and ingested by companies every day, supply chain attacks have no chance of slowing down.
While hackers used to wait for public vulnerability disclosures to exploit in the wild, they’re now proactively manufacturing vulnerabilities and publishing these into repositories — the most popular being the npm repository.
How can organizations combat these supply chain attacks that continue to grow in sophistication? It’s more than auditing your repositories for vulnerabilities.
Join our webinar and see how Nexus Firewall lets you take the good and leave the bad, by quarantining non-compliant components at the door and enforcing open source policies during proxy. See how automated security policies prevent development teams from using non-compliant components, saving time and money across teams and stopping defective code at the start.
What we’ll cover:
Sonatype Headquarters - 8161 Maple Lawn Blvd #250, Fulton, MD 20759
Tysons Office - 8281 Greensboro Drive – Suite 630, McLean, VA 22102
Australia Office - 60 Martin Place Level 1, Sydney, NSW 2000, Australia
London Office -168 Shoreditch High Street, E1 6HU London
Subscribe for all the latest software security news and events
Copyright © 2008-present, Sonatype Inc. All rights reserved. Includes the third-party code listed here. Sonatype and Sonatype Nexus are trademarks of Sonatype, Inc. Apache Maven and Maven are trademarks of the Apache Software Foundation. M2Eclipse is a trademark of the Eclipse Foundation. All other trademarks are the property of their respective owners.
Terms of Service Privacy Policy Modern Slavery Statement Event Terms and Conditions Do Not Sell My Personal Information