Главная
Study mode:
on
1
Intro
2
What is open source security?
3
The tree of open source
4
Transitive vulnerabilities
5
Solution: Update the root
6
How different ecosystems work
7
Python
8
Java
9
JavaScript
10
Go
11
How we solve the problem
12
Neo4j demo
13
Outro
Description:
Explore how graph database technology can be leveraged to resolve transitive vulnerabilities at scale in open source dependencies. Learn about the challenges of updating indirect dependencies and how Neo4j's graph database and algorithms provide an effective solution. Dive into the creation of a comprehensive graph of open source interdependencies and its application in accurately resolving vulnerabilities within complex tree structures. Gain insights into the workings of different ecosystems such as Python, Java, JavaScript, and Go. Watch a detailed Neo4j demo showcasing practical implementation. Understand the intricacies of open source security and the importance of addressing dependency confusion in modern software development.

Using Graph Database Technology to Resolve Transitive Vulnerabilities at Scale

GOTO Conferences
Add to list