您的当前位置: 首页 > 精彩报告合集 > 会议峰会 > IT互联网 > 2023云原生安全大会(Cloud Native Security Con 2023)嘉宾PPT合集(共55套打包)
2023云原生安全大会(Cloud Native Security Con 2023)嘉宾PPT合集(共55套打包)

2023云原生安全大会(Cloud Native Security Con 2023)嘉宾PPT合集(共55套打包)

2023云原生安全大会(Cloud Native Security Con 2023)嘉宾PPT合集。

更新时间:2023-09-14 报告数量:55份 浏览次数:85

合集标签

Cloud Native Security Con 2023
ZT-Workload-Identities-CloudNativeSecurityCon_2023.pptx.pdf   ZT-Workload-Identities-CloudNativeSecurityCon_2023.pptx.pdf (浏览:7)
Sharing Security Secrets_ How to Encourage Security Advocates (1).pdf   Sharing Security Secrets_ How to Encourage Security Advocates (1).pdf (浏览:1)
Security Does Not Need To Be Fun_ Ignoring OWASP To Have A Terrible Time - Dwayne McDaniel - CNCF 2023.pptx   Security Does Not Need To Be Fun_ Ignoring OWASP To Have A Terrible Time - Dwayne McDaniel - CNCF 2023.pptx (浏览:2)
Standardization and Security - A Perfect Match - CNSCON.pdf   Standardization and Security - A Perfect Match - CNSCON.pdf (浏览:2)
presentation.pdf   presentation.pdf (浏览:2)
securitycon-aaron-wayne.pdf   securitycon-aaron-wayne.pdf (浏览:1)
SBOM-VEX-Kubernetes-CloudNativeSecurityCon_2023_ppt.pdf   SBOM-VEX-Kubernetes-CloudNativeSecurityCon_2023_ppt.pdf (浏览:2)
More Than Just a Pretty Penny! Why You Need Cybersecurity In Your Culture.pdf   More Than Just a Pretty Penny! Why You Need Cybersecurity In Your Culture.pdf (浏览:2)
L3toL7-MitchConnors-BernardVanDeWalle.pdf   L3toL7-MitchConnors-BernardVanDeWalle.pdf (浏览:2)
HowToSecureSupplyChain_2023.pdf   HowToSecureSupplyChain_2023.pdf (浏览:3)
From the Cluster to the Cloud-Lateral Movements in Kubernetes.pdf   From the Cluster to the Cloud-Lateral Movements in Kubernetes.pdf (浏览:1)
So You Want to Run Your Own Sigstore_ Recommendations for a Secure Setup.pdf   So You Want to Run Your Own Sigstore_ Recommendations for a Secure Setup.pdf (浏览:2)
CSI_Container.pdf   CSI_Container.pdf (浏览:1)
Security++ Hide your secrets via a distributed Hardware Security Module.pdf   Security++ Hide your secrets via a distributed Hardware Security Module.pdf (浏览:1)
container_patching_cnscon_2023_castle_panther.pdf   container_patching_cnscon_2023_castle_panther.pdf (浏览:1)
SaC_ a DevSecOps Approach.pdf   SaC_ a DevSecOps Approach.pdf (浏览:1)
Trust and Risk in the Software Supply Chain.pdf   Trust and Risk in the Software Supply Chain.pdf (浏览:1)
cnscna23 tracee pipeline.pdf   cnscna23 tracee pipeline.pdf (浏览:1)
Supply Chain presentation (1).pptx   Supply Chain presentation (1).pptx (浏览:1)
Leverageing SBOMS to Automate Packaging, Transfer, and Reporting of Dependencies Between Secure Environments.pdf   Leverageing SBOMS to Automate Packaging, Transfer, and Reporting of Dependencies Between Secure Environments.pdf (浏览:1)
Self Healing GitOps_ Continuous, Secure GitOps using Argo CD, Helm and OPA - Tenable - Upkar Lidder.pdf   Self Healing GitOps_ Continuous, Secure GitOps using Argo CD, Helm and OPA - Tenable - Upkar Lidder.pdf (浏览:1)
CNCF23_Cryptoagility.pptx (2).pdf   CNCF23_Cryptoagility.pptx (2).pdf (浏览:1)
Good Fences Make Good Neighbors.pdf   Good Fences Make Good Neighbors.pdf (浏览:1)
CloudNativeSecurityCon_2023_ppt.pdf   CloudNativeSecurityCon_2023_ppt.pdf (浏览:1)
SecurityReviews_CNSCon_2023.pdf   SecurityReviews_CNSCon_2023.pdf (浏览:1)
Securing the Superpowers - Who loaded that eBPF program_.pptx   Securing the Superpowers - Who loaded that eBPF program_.pptx (浏览:0)
CloudNativeSecurityCon_2023-MultiServiceNoMesh.pdf   CloudNativeSecurityCon_2023-MultiServiceNoMesh.pdf (浏览:0)
Cloud_Native_Security_Con-Ztunnel Security .pdf   Cloud_Native_Security_Con-Ztunnel Security .pdf (浏览:0)
ContainerFactoryforAerospace&Defense.pdf   ContainerFactoryforAerospace&Defense.pdf (浏览:0)
Securing Self Hosted GHActions ARC NSomersall.pdf   Securing Self Hosted GHActions ARC NSomersall.pdf (浏览:0)
PDF - Do This Not That.pdf   PDF - Do This Not That.pdf (浏览:0)
batCAVE for CNCF Security Con 2023.pdf   batCAVE for CNCF Security Con 2023.pdf (浏览:0)
CloudNativeCryptojacking.pdf   CloudNativeCryptojacking.pdf (浏览:0)
cncf-seccon-na-2023-unpacking-open-source-security-in-public-repos-and-registries-final.pdf   cncf-seccon-na-2023-unpacking-open-source-security-in-public-repos-and-registries-final.pdf (浏览:0)
K8s Admission Controllers from scratch.pdf   K8s Admission Controllers from scratch.pdf (浏览:1)
Package-Transparency-for-Wasm-Registries.pdf   Package-Transparency-for-Wasm-Registries.pdf (浏览:0)
Cloud Native Security 101_CNSCon23.pdf   Cloud Native Security 101_CNSCon23.pdf (浏览:0)
CloudNativeSecurityCon_2023-CloudSecurityEvents.pdf   CloudNativeSecurityCon_2023-CloudSecurityEvents.pdf (浏览:0)
JWTS_Common_Pitfalls.pdf   JWTS_Common_Pitfalls.pdf (浏览:0)
ebpf-needle-haystack.pdf   ebpf-needle-haystack.pdf (浏览:0)
20230201 - CloudNativeSecurityCon NA 2023 - Securing user to server access in Kubernetes.pdf   20230201 - CloudNativeSecurityCon NA 2023 - Securing user to server access in Kubernetes.pdf (浏览:1)
CloudNative Security Con 2023.pdf   CloudNative Security Con 2023.pdf (浏览:0)
Compliance_CloudNativeSecurityCon_2023.pptx.pdf   Compliance_CloudNativeSecurityCon_2023.pptx.pdf (浏览:0)
Devo - Cloud Native Security Conference.pptx   Devo - Cloud Native Security Conference.pptx (浏览:0)
Beyond cluster-admin_ Getting Started with Kubernetes Users and Permissions.pdf   Beyond cluster-admin_ Getting Started with Kubernetes Users and Permissions.pdf (浏览:0)
CNCF SecurityCon - Zero Trust in the Cloud.pdf   CNCF SecurityCon - Zero Trust in the Cloud.pdf (浏览:0)
254715 - Security That Enables SecurityCon 2023 -Saurabh_Wadhwa.pptx   254715 - Security That Enables SecurityCon 2023 -Saurabh_Wadhwa.pptx (浏览:0)
CNSCon Keynote - Brandon.pdf   CNSCon Keynote - Brandon.pdf (浏览:0)
CloudNativeSecurityCon_2023_Parsec_Attestation.pdf   CloudNativeSecurityCon_2023_Parsec_Attestation.pdf (浏览:0)
CloudNativeSecurityCon-deck_SUSE.pdf   CloudNativeSecurityCon-deck_SUSE.pdf (浏览:2)
CloudNativeSecurityCon 2023 .pdf   CloudNativeSecurityCon 2023 .pdf (浏览:0)
Cloud Native SecurityCon Feb 2023 final.pdf   Cloud Native SecurityCon Feb 2023 final.pdf (浏览:0)
Cloud Native Security Con NA 2023 - OIDC.pdf   Cloud Native Security Con NA 2023 - OIDC.pdf (浏览:0)
App Security Leads to Better Business Value CloudNative SecurityCon NA 2023 V1.0.pdf   App Security Leads to Better Business Value CloudNative SecurityCon NA 2023 V1.0.pdf (浏览:0)
ACFrOgCLhP9OMvA9pjVqj9Yu3Mnc3j04Tgt46V_zwCbb8ykMR-wDTJfrwJf5slvUdmUc2RXmzXcBfuHLfLwIL8kau4G2mNolmD5V1enigp2TezF0Ut7q65hkdsK6OmO0WLJMhr8kJe40Iurwll-L.pdf   ACFrOgCLhP9OMvA9pjVqj9Yu3Mnc3j04Tgt46V_zwCbb8ykMR-wDTJfrwJf5slvUdmUc2RXmzXcBfuHLfLwIL8kau4G2mNolmD5V1enigp2TezF0Ut7q65hkdsK6OmO0WLJMhr8kJe40Iurwll-L.pdf (浏览:0)

报告合集目录

报告预览

  • 全部
    • 2023云原生安全大会(Cloud Native Security Con 2023)嘉宾PPT合集
      • ZT-Workload-Identities-CloudNativeSecurityCon_2023.pptx.pdf
      • Sharing Security Secrets_ How to Encourage Security Advocates (1).pdf
      • Security Does Not Need To Be Fun_ Ignoring OWASP To Have A Terrible Time - Dwayne McDaniel - CNCF 2023.pptx
      • Standardization and Security - A Perfect Match - CNSCON.pdf
      • presentation.pdf
      • securitycon-aaron-wayne.pdf
      • SBOM-VEX-Kubernetes-CloudNativeSecurityCon_2023_ppt.pdf
      • More Than Just a Pretty Penny! Why You Need Cybersecurity In Your Culture.pdf
      • L3toL7-MitchConnors-BernardVanDeWalle.pdf
      • HowToSecureSupplyChain_2023.pdf
      • From the Cluster to the Cloud-Lateral Movements in Kubernetes.pdf
      • So You Want to Run Your Own Sigstore_ Recommendations for a Secure Setup.pdf
      • CSI_Container.pdf
      • Security++ Hide your secrets via a distributed Hardware Security Module.pdf
      • container_patching_cnscon_2023_castle_panther.pdf
      • SaC_ a DevSecOps Approach.pdf
      • Trust and Risk in the Software Supply Chain.pdf
      • cnscna23 tracee pipeline.pdf
      • Supply Chain presentation (1).pptx
      • Leverageing SBOMS to Automate Packaging, Transfer, and Reporting of Dependencies Between Secure Environments.pdf
      • Self Healing GitOps_ Continuous, Secure GitOps using Argo CD, Helm and OPA - Tenable - Upkar Lidder.pdf
      • CNCF23_Cryptoagility.pptx (2).pdf
      • Good Fences Make Good Neighbors.pdf
      • CloudNativeSecurityCon_2023_ppt.pdf
      • SecurityReviews_CNSCon_2023.pdf
      • Securing the Superpowers - Who loaded that eBPF program_.pptx
      • CloudNativeSecurityCon_2023-MultiServiceNoMesh.pdf
      • Cloud_Native_Security_Con-Ztunnel Security .pdf
      • ContainerFactoryforAerospace&Defense.pdf
      • Securing Self Hosted GHActions ARC NSomersall.pdf
      • PDF - Do This Not That.pdf
      • batCAVE for CNCF Security Con 2023.pdf
      • CloudNativeCryptojacking.pdf
      • cncf-seccon-na-2023-unpacking-open-source-security-in-public-repos-and-registries-final.pdf
      • K8s Admission Controllers from scratch.pdf
      • Package-Transparency-for-Wasm-Registries.pdf
      • Cloud Native Security 101_CNSCon23.pdf
      • CloudNativeSecurityCon_2023-CloudSecurityEvents.pdf
      • JWTS_Common_Pitfalls.pdf
      • ebpf-needle-haystack.pdf
      • 20230201 - CloudNativeSecurityCon NA 2023 - Securing user to server access in Kubernetes.pdf
      • CloudNative Security Con 2023.pdf
      • Compliance_CloudNativeSecurityCon_2023.pptx.pdf
      • Devo - Cloud Native Security Conference.pptx
      • Beyond cluster-admin_ Getting Started with Kubernetes Users and Permissions.pdf
      • CNCF SecurityCon - Zero Trust in the Cloud.pdf
      • 254715 - Security That Enables SecurityCon 2023 -Saurabh_Wadhwa.pptx
      • CNSCon Keynote - Brandon.pdf
      • CloudNativeSecurityCon_2023_Parsec_Attestation.pdf
      • CloudNativeSecurityCon-deck_SUSE.pdf
      • CloudNativeSecurityCon 2023 .pdf
      • Cloud Native SecurityCon Feb 2023 final.pdf
      • Cloud Native Security Con NA 2023 - OIDC.pdf
      • App Security Leads to Better Business Value CloudNative SecurityCon NA 2023 V1.0.pdf
      • ACFrOgCLhP9OMvA9pjVqj9Yu3Mnc3j04Tgt46V_zwCbb8ykMR-wDTJfrwJf5slvUdmUc2RXmzXcBfuHLfLwIL8kau4G2mNolmD5V1enigp2TezF0Ut7q65hkdsK6OmO0WLJMhr8kJe40Iurwll-L.pdf
请点击导航文件预览
资源包简介:

1、Michael Peters-Red HatZero Trust Workload Identity in KubernetesZero Trust?Architectural Pattern Security applied at the asset level Not the location(network)ImplicitZero Trust?Zero Trust?Microservic。

2、Cailyn EdwardsShopifySharing Security Secrets:How to Encourage Security Advocates1.The Basicsa.Whatb.Whoc.Why2.Howa.Mangersb.Individual Contributors3.Examplesa.Security Reviewsb.Security Self Assessm。

3、mcdwaynemcdwayneSecurity Does Not Need To Be Fun:Ignoring OWASP To Have A Terrible TimemcdwaynemcdwayneHi,Im DwayneDwayne McDaniel I live in Chicago Ive been a Developer Advocate since 2016 On Twitte。

4、STANDARDIZATION&SECURITY:A PERFECT MATCHFEBRUARY 1,2023RAVI DEVINENISenior Director,Engineering,Northwestern MutualvscarpenterVINNY CARPENTERVice President,Engineering,Northwestern Mutualravicdev。

5、Improving Secure Pod-to-PodCommunication Using Trust Bundles Ted Hahn,Mark Hahn, Mutual TLS-Secure Pod-to-Pod communicationEvery Kubernetes pod should include a SSL Certificate,verifying itsidentity.。

6、 Securing Diverse Supply Chains across Interconnected SystemsWayne StarrAaron Creel01 February 2023 The ProblemSynergizing activities across an organization for Large Software Systems can be difficul。

7、SBOMs,VEX,and KubernetesKiran KamityFounder&CEODeepfactorAllan FriedmanSenior Advisor and StrategistCISAJonathan MeadowsManaging Director,Cybersecurity,CitiGroupRose JudgeSenior Open Source Engin。

8、Michaela Flatau&Callan AndreacchiMore Than Just a Pretty Penny!Why You Need Cybersecurity In Your CultureCyber Attacks are EvolvingChatGPT and other tools are lowering barriers for cyber attacker。

9、Bernard Van De Walle,SplunkMitch Connors,AviatrixNetwork Security at ScaleMeet Your SpeakersBernard Van De WallePrincipal software engineer,SplunkK8s,Istio,Envoy operations at scalePreviously at Crui。

10、Hemil Kadakia&Yonghe Zhao,YahooSecure your Software Supply Chain at ScaleAgenda What is software supply chain&why is it important?Existing solutions Infrastructure&Scale at Yahoo!Demos&am。

11、Yossi Weizman&Ram Pliskin,MicrosoftFrom the Cluster to the Cloud:Lateral Movements in KubernetesAgendaIdentity types in KubernetesInner-cluster lateral movementCluster-to-cloud lateral movement:A。

12、Hayden BlauzvernGoogle Open Source Security TeamSo You Want to Run Your Own Sigstore:Recommendations for a Secure SetupSigstore OverviewSigstore OverviewProject under the OpenSSF(Linux Foundation)Sim。

13、Alberto Pellitteri Security ResearcherCSI Container:Can You DFIR It?Stefano ChiericiThreat Research Lead Manager#WhoAreWe?Alberto Pellitteri Security Researcher Sysdig pellibert1 https:/ Falco Rule C。

14、Iris DingCloud Software Engineer,Malini BhandaruSenior Principal Engineer,Thanks to my colleagues:QimingLiu,HuailongZhang,XintongChen,XinHuang,RuijingGuo,RuoyuYing,ChangranWang,ForrestZhao,SoodKapil,。

15、Container PatchingMaking It Less Gross Than The Seattle Gum WallGreg Castlemrgcastle,gregcastleinfosec.exchangeGKE Security,Google CloudWeston PantherGKE Security,Google CloudSimple View Of Patching0。

16、Security as Code,a DevSecOps ApproachXavier Ren-Corailxcorailhttps:/Planet MarsWhat is different 9 years later?Inclusion in the SDLC43%https:/ that security testing is done late in the SDLCHow can we。

17、Trust and Risk in the software supply chain Emmy EideDirector,Supply Chain SecurityProduct Security,Red Hat22022 State of the Software Supply Chain-SonatypeWhat is happening?Supply chain attacks are 。

18、 2023 Aqua Security So2ware Ltd.,All Rights Reserved Itay ShakuryJose Donize3Verfiable GitHub Ac0ons using eBPFitayskjosedonize-3Tracee-Run+me Security and Forensics using eBPFContainer startedProces。

19、Demian Ginther,SuperOrbital LLC 2022Demian Ginther,SuperOrbital LLC 2022Learning from Supply Chain Learning from Supply Chain Failures and Best Practices in Failures and Best Practices in Other Indus。

20、Leveraging SBOMS to Automate Packaging,Transfer,and Reporting of Dependencies Between Secure EnvironmentsCloudNativeSecurityConP R E S E N T E RI a n D u n b a r-H a l lJ e r o d H e c kDAT EFe b 2 n。

21、Self Healing GitOps:Continuous,Secure GitOps using Argo CD,Helm and OPAUpkar LidderSenior Product Manager,Tenable CLOUD NATIVE INFRASTRUCTURE IS FUELING INNOVATIONCNCF Survey 2020CREATING INCREASED V。

22、Natalie FisherCryptographic Agility:Preparing Modern Apps for Quantum Safety and BeyondAgenda What is Cryptographic Agility?Why do you care?How to prepare VMwares PlansRequired DisclaimerWhat is Cryp。

23、Good Fences Make Good NeighborsMaking Cross-Namespace References more secure with ReferenceGrantSpeaker:Nick YoungyoungnickNot this type of NeighboursyoungnickWhat well talk about Namespaces are one 。

24、Arun Krishnakumar,VMware IncWhen Sys-Admins QuitProtecting Kubernetes Clusters when Cluster-Admins QuitProblemUsually,humans are operators and owners of Clusters.Humans change teams or companiesWhen 。

25、Ragashree M C,CISSPGraduate Student,Carnegie Mellon UniversityTechnical Lead,CNCF TAG SecuritySneak Peak into the Security Assessment with the communityWhat a wonderful world.-We are more connected n。

26、John Fastabend,Natalia Reka IvankoSecuring the Superpowers-Who loaded that eBPF program?SpeakersNatalia Reka IvankoSecurity Product LeadIsovalentJohn FastabendTetragon Lead&Cilium Maintainer,Engi。

27、Multi-Service Without A MeshEvan AndersonWhy This Talk?Use existing,mature technologies“The hard way”building understanding by building a thingIts not as easy as it should beWe can make it better!Mul。

28、solo.ioWhats a Zero-Trust Tunnel?Exploring Security and Simpler Operations with Istio Ambient Mesh2|Copyright 2022Jim Bartonjameshbartonjimsolo.iohttps:/ Engineer-North America Solo3|Copyright 2022vi。

29、CONTAINER FACTORY FOR AEROSPACE&DEFENSESarah Miller Melissa RobertsonCLS24582058 2023 Collins Aerospace.|This document does not include any export controlled technical data.Sarah MillerSr.Technic。

30、Natalie SomersallSenior Solutions Engineer,GitHubSecuring Self-Hosted GitHub Actions With Kubernetes and Actions-Runner-ControllerAbout meSenior Solutions Engineer,GitHubLoveEmpowering developers to 。

31、Do This,Not ThatMaya Levine,Product ManagerLessons from 7 Headline Grabbing Security BreachesCloud vs On Premise Threats and BreachesThis well does not contain anyPOISONED WATERDrink it you are not i。

32、Delivering Secure Healthcare Applications with OSSRobert Wood-CMSGedd Johnson-Defense UnicornsWhat is CEnters for medicare and medicaidCMSs mission is to serve Medicare&Medicaid beneficiariesWe p。

33、Mor WeinbergerFrom Illuminating to Eliminating Crypto Jacking Techniques in Cloud NativeAgendaIntroWhat is Crypto MiningThe Birth of Crypto-jacking and Why Its So PopularCrypto-jacking Evolution and 。

34、Unpacking Open Source Security in Public Repos&RegistriesCraig Box VP OSS and Ben Hirschberg CTOBen Hirschberg Co-founder&CTO ARMOKubescape maintainerWhitehat in the past(unofficially still;-。

35、K8s Admission Controllersfrom scratchBy Steve GiguereMeet the Proctors Steve Giguere Matt Johnson Angela GizziDeveloper Advocate-Bridgecrew DevRel Lead-Prisma Cloud Technical Marketing -PANWAn admiss。

36、Package Transparency forWebAssembly RegistriesKyle Brown,SingleStoreOverviewIntroduce WebAssembly(Wasm)What is a Package Registry?Applying Certificate Transparency to Package RegistriesPackage Transp。

37、Rafik HarabiCloud Native Security 101:Building Blocks,Patterns and Best Practices1Who Am I?Senior Solution Architect at Sysdig,Cloud Security AdvocateFocus on Cloud Native Security and ObservabilityP。

38、A Lightweight Framework For Security ReactionsCloud(Security)EventsEvan AndersonWhat Is An Event?A notification that something happened in a system.Photo by Jeff Finley on UnsplashWhat Is CloudEvents。

39、JWTsUnderstanding Common PitfallsBruce MacDonaldUnderstand JWTs to use them securelyBy the end of this talk you should be able to accept and validate JWTs in your own service.-JWT format-Usage-Signin。

40、Finding the Needles in a Haystack:identifying suspicious behaviors with eBPFJeremy CowanDeveloper Advocate,Amazon EKSWasiq MuhammadSecurity Engineer,Amazon GuardDutyThe challenges Capturing and monit。

41、Maisem Ali&Maya KaczorowskiSecuring user to server access in Kubernetes maisem_ali,MayaKaczorowski ,MayaKaczorowskiinfosec.exchangeMaya KaczorowskiHead of Productshe/herMaisem AliMember of Techni。

42、CNI or Service Mesh?Comparing Security Policies Across ProvidersChristine Kim-GooglextineskimRob Salmond-SuperOrbitalmastodon.social/rsalmondWhat well cover.Whats a CNI?Whats a Service Mesh?The What 。

43、Robert FiccagliaPolicy Governance with OSCAL$idRobert Ficcaglia,co-chair wg-policy$ls-al.stuff_i_do Kubernetes sig-security SOX,SOC2,HIPAA,ISO,HITRUST FISMA,CJIS,FedRAMP OSCAL Machine Learningespecia。

44、Mapping Motives Tells a Story:Mapping Motives Tells a Story:JOSHUA SMITHJOSHUA SMITHSecurity Content EngineerDAVID WOLFDAVID WOLFSecurity Innovation Researcher Analysis of 2,000 Enterprise Cloud Dete。

45、Beyond cluster-admin:Getting Started with Kubernetes Users and PermissionsTiffany JerniganDeveloper AdvocateVMwaretiffanyfayjT I F F A N Y F A Y JT I F F A N Y F A Y M A S T O D O N.O N L I N E AUTHE。

46、Zero Trust in the CloudWith WebAssembly and wasmCloudAbout MeAuthor“Programming WebAssembly with Rust”Cloud Native GoBuilding Microservices with ASP.NET Core a lot moreCreator of the CNCF project was。

47、Security That Enables:Breaking Down Security Silos in the DevOps EcosystemSr.Solutions EngineerSaurabh Wadhwa2AgendaIntroduction1Rise in attacks on CI/CD ecosystem 2Security gaps in traditional pipel。

48、Brandon Lum(lumjjb)Software Engineer,GoogleThe Next Steps in Software Supply Chain SecuritylumjjbSUPPLY CHAIN ATTACKSSECURITYIncrease in Attacks lead to strong industry responselumjjbProducing Truste。

展开阅读全文
2200
2200 专家认证

该用户很懒,什么也没介绍

会员购买
客服

专属顾问

商务合作

机构入驻、侵权投诉、商务合作

服务号

三个皮匠报告官方公众号

回到顶部