Black Hat, Cloud Security, Supply chain

Understanding and reducing supply chain risk and software vulnerability risks

Share

In complex software ecosystems, individual application risks are compounded. When it comes to mitigating supply chain risk, identifying backdoors or unintended vulnerabilities that can be exploited in your environment is just as critical as staying current with the latest hacking intel. Understand how to spot and reduce the risk to your environment and prevent disruption to your operation.

CyberRisk TV speaks with ThreatLocker's Danny Jenkins at the Black Hat 2024 conference in Las Vegas on their approach to protection rather than detection.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.