The risk of supply chain attacks is only increasing as malicious actors target development environments and delivery processes to morph trusted software into a weapon. Today various stages of supply chain attacks can be executed with tampered software or malware masquerading as trusted applications and updates.
During this webinar, Jasmine Noel, Sr. Product & Solutions Marketing, will cover why existing application security testing and software composition analysis have struggled to reliably detect indicators of tampering, the differences between tampering and vulnerabilities, and the three tampering detection techniques required to improve visibility across the software supply chain. This will include covering which indicators must be detected, what software artifacts must be assessed, and when assessments must occur.