
Sign up to save your podcasts
Or
Whether you are deploying your own software or someone else's software, there are a chain of dependencies that likely includes vulnerabilities. From the base OS image, to utilities, to frameworks and app servers, to language specific libraries, all can contain vulnerabilities. Not only can they contain vulnerabilities, but the chain of dependencies can carry vulnerabilities as well. Learn how to combat this problem in this segment!
To learn more about Snyk, visit: https://securityweekly.com/snyk
Visit https://www.securityweekly.com/esw for all the latest episodes!
Show Notes: https://wiki.securityweekly.com/ESWEpisode186
4.7
33 ratings
Whether you are deploying your own software or someone else's software, there are a chain of dependencies that likely includes vulnerabilities. From the base OS image, to utilities, to frameworks and app servers, to language specific libraries, all can contain vulnerabilities. Not only can they contain vulnerabilities, but the chain of dependencies can carry vulnerabilities as well. Learn how to combat this problem in this segment!
To learn more about Snyk, visit: https://securityweekly.com/snyk
Visit https://www.securityweekly.com/esw for all the latest episodes!
Show Notes: https://wiki.securityweekly.com/ESWEpisode186
361 Listeners
628 Listeners
6,020 Listeners
181 Listeners
1,007 Listeners
16 Listeners
311 Listeners
7,865 Listeners
171 Listeners
187 Listeners
91 Listeners
74 Listeners
2 Listeners
56 Listeners
129 Listeners