Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Grab it
Learn essential strategies for protecting against supply chain attacks in this BSidesCharm conference talk. Explore the complexities of hardware, firmware, and software supply chains while discovering practical approaches to minimize trust and verify component integrity. Dive into open-source and free tools for device enumeration and validation, with real-world examples including the MSI breach and Black Lotus attacks. Master defensive techniques like Trusted Platform Module implementation, LVFS FWUPD usage, and secure boot configuration. Gain insights into vulnerability management, third-party software considerations, and in-house development security from security expert Paul Asadoorian, Principal Security Evangelist at Eclypsium and host of Paul's Security Weekly podcast. Examine Linux-specific examples and understand how to implement robust supply chain security measures across your technology stack.
Protecting Yourself From Supply Chain Attacks - Trust Is Overrated