Главная
Study mode:
on
1
Introduction
2
Why are we building software
3
Large change in the way we develop
4
Agile to DevOps
5
Open Source
6
Disadvantages of Open Source
7
Software Supply Chain Attacks
8
Confluence Server Attack
9
PipeI Package Attack
10
Biden Executive Order
11
Evil Hackers
12
Workshop Walkthrough
13
Requirements
14
Setup
15
Instructions
16
OS Index
17
OS Index Overview
18
Supported Languages
19
AHAB
20
How popular is that package
21
Integrations
22
Questions
Description:
Explore the critical aspects of software security in this 32-minute tutorial focusing on the Struts2 vulnerability. Delve into the evolution of software development practices, from Agile to DevOps, and understand the advantages and risks associated with open source. Examine real-world examples of software supply chain attacks, including the Confluence Server and PipeI Package incidents. Learn about the Biden Executive Order's impact on cybersecurity. Participate in a hands-on workshop to gain practical experience in identifying and addressing vulnerabilities. Discover tools like OS Index for assessing package popularity and security risks across multiple programming languages. Gain insights into integrations and be prepared to tackle questions about modern software security challenges.

Struts2 Vulnerability Workshop - Securing Applications Against Supply Chain Attacks

Linux Foundation
Add to list
0:00 / 0:00