
Sign up to save your podcasts
Or
Over the last few years, security professionals have become increasingly concerned about where software, and software components, come from.
A growing number of significant security breaches have been caused by vulnerabilities in the software supply chain.
But should we now start to look beyond just software, and look at data too?
Jon Geater thinks we should. The keynote speaker at this year’s CRESTCon Europe, Jon is co-founder at RKVST and co-chair if the IETF’s supply chain integrity, transparency and trust working group.
Here, he discusses with editor Stephen Pritchard how we need to go beyond just software bills of materials and start to look at documents and data too, if we are to prevent disruption to the business.
Over the last few years, security professionals have become increasingly concerned about where software, and software components, come from.
A growing number of significant security breaches have been caused by vulnerabilities in the software supply chain.
But should we now start to look beyond just software, and look at data too?
Jon Geater thinks we should. The keynote speaker at this year’s CRESTCon Europe, Jon is co-founder at RKVST and co-chair if the IETF’s supply chain integrity, transparency and trust working group.
Here, he discusses with editor Stephen Pritchard how we need to go beyond just software bills of materials and start to look at documents and data too, if we are to prevent disruption to the business.