Guest: Tzachi Zornstain
Guest Title: Co-Founder & CEO, Dustico
Topic: Software Package Dependencies Attacks
Supply chain and software dependencies attacks are becoming more popular, and organizations are having a hard time coping with those types of vectors. In this episode, we spoke with Tzach Zornstain, Co-Founder at Dustico, about the difference between malicious software and vulnerable software, and how organizations should use 3rd party software for the development of their own applications securely.
Attendees Guest: Evgeny Zislis Guest title: CTO Company: ProdOPS Abstract Over 90% of IaaS/PaaS security incidents happens on consumer fault. Cloud platforms are complicated,...
Guest: Niv David Guest title: Customer Cyber Security Director, Ericsson North America; Fellow & Lecturer, Yuval Ne'eman Workshop for Science, Technology and Security, Tel-Aviv...
Guest: Leonid Sandler Guest title: CTO, Armosec Topic: Securing K8’s Deployments Language: English Abstract As K8’s adoption grows and matures, we sat down with...