Full-Spectrum Software Supply Chain Management Webinar Series
webinar-hex-icon-shield

Your First Line Of Defense Against Software Supply Chain Attacks

webinar-icon-time

Thursday, September 30th

1:00 PM - 1:30 PM EST | 10:00 AM - 10:30 AM PST

webinar-icon-time

Thursday, September 30th

1:00 PM - 1:30 PM EST | 10:00 AM - 10:30 AM PST

Headshot_Hexagon_Charlie_Rice@2x

 

Presented by:

Charlie Rice
Solutions Architect at Sonatype
Headshot_Hexagon_Charlie_Rice@2x

 

Presented by:

Charlie Rice
Solutions Architect at Sonatype

This year, we’ve seen some of the most sophisticated software supply chain attacks launched by cybercriminals and adversaries affecting public and private companies across the globe.

Open source fuels software supply chains however these attacks are successful because they target vulnerabilities that can lie within open source.

With 21,000+ new open source projects being released and ingested by companies every day, supply chain attacks have no chance of slowing down. 

While hackers used to wait for public vulnerability disclosures to exploit in the wild, they’re now proactively manufacturing vulnerabilities and publishing these into repositories — the most popular being the npm repository. 

How can organizations combat these supply chain attacks that continue to grow in sophistication? It’s more than auditing your repositories for vulnerabilities. 

Join our webinar and see how Nexus Firewall lets you take the good and leave the bad, by quarantining non-compliant components at the door and enforcing open source policies during proxy. See how automated security policies prevent development teams from using non-compliant components, saving time and money across teams and stopping defective code at the start. 

What we’ll cover:  

  • Define custom policies - automatically protect your pipeline from open source risks
  • Quarantine provides your team with the tactical capability to fully prevent components from even entering a repository
  • Control staging and release repositories so you can block unapproved releases from entering production
  • Enforce protection against dependency confusion attacks

Save Your Seat