
Sign up to save your podcasts
Or
For the video of this podcast: How to Fight Threats to the Software Supply Chain
Follow Fedinsider on LinkedIn
The federal government is playing a game of cyber-attack-a-mole with bad actors, constantly adapting to their threats but ultimately driving them to other areas, such as targeting endpoints or applications to find a weak point not being monitored.
This week on Feds At the Edge, we are focusing on sophisticated attacks on federal applications and APIs.
Jerry Cochran, Deputy Chief Information Officer and Director of the Cybersecurity & DigitalOps Division from Pacific Northwest National Laboratory, shares how the once popular Software Bill of Materials has weakened over the years thanks to the constant change of code.
AI can help detect vulnerabilities in dynamic code, but attackers also use AI to find weaknesses. Instead of signature-based approaches, Nate Fountain Deputy CISO from ICE, suggests using behavior analytics to prevent compromised code from exfiltrating data.
Tune in on your favorite podcasting platform as our experts discuss the ongoing battle.
5
55 ratings
For the video of this podcast: How to Fight Threats to the Software Supply Chain
Follow Fedinsider on LinkedIn
The federal government is playing a game of cyber-attack-a-mole with bad actors, constantly adapting to their threats but ultimately driving them to other areas, such as targeting endpoints or applications to find a weak point not being monitored.
This week on Feds At the Edge, we are focusing on sophisticated attacks on federal applications and APIs.
Jerry Cochran, Deputy Chief Information Officer and Director of the Cybersecurity & DigitalOps Division from Pacific Northwest National Laboratory, shares how the once popular Software Bill of Materials has weakened over the years thanks to the constant change of code.
AI can help detect vulnerabilities in dynamic code, but attackers also use AI to find weaknesses. Instead of signature-based approaches, Nate Fountain Deputy CISO from ICE, suggests using behavior analytics to prevent compromised code from exfiltrating data.
Tune in on your favorite podcasting platform as our experts discuss the ongoing battle.