Securing the software supply chain with Tekton and Sigstore

  Переглядів 247

The Linux Foundation

The Linux Foundation

День тому

Many companies are increasingly focusing on securing their software supply chain, particularly after the Biden Administration’s Executive Order and some high-profile vulnerabilities making the headlines. Chainguard is a software supply chain security startup focused on providing a trusted supply chain of open-source components that enterprises can grab and build and use in all of their infrastructure. Billy Lynch, software engineer at Chainguard, says, “Our goal is to make software supply chain secure by default.” Chainguard is also involved in several Continuous Delivery (CD) Foundation projects, such as being on the governing board for Tekton and being a maintainer for Tekton Chains and Sigstore. Lynch believes there is a natural relationship in joining Tekton and Sigstore together. For instance, Sigstore’s CoSign tool can be brought into Tekton as part of the software supply chain story to provide verifiable provenance.
What kind of challenges are we facing today in terms of software supply chain security? What does open source mean for security? What kind of open source projects Chainguard is involved with to help companies improve their security posture. We find answers to all these questions in this interview, check it out.

КОМЕНТАРІ
Why You Should Leave Your Country NOW
17:53
Nomad Capitalist
Переглядів 32 тис.
Лизка заплакала смотря видео котиков🙀😭
00:33
The World's Fastest Cleaners
00:35
MrBeast
Переглядів 92 млн
Why sustainability is the next horizon for auditing
25:06
Exemplar Global
Переглядів 58
Perplexity CTO Denis Yarats on AI-powered search
35:15
Unusual Ventures
Переглядів 2,3 тис.
Don't Contribute to Open Source
9:55
Theo - t3․gg
Переглядів 210 тис.
3 Tech Jobs That Made me a Million Dollars
21:30
SkillHat Inc
Переглядів 4,4 тис.
Keynote: The Next Steps in Software Supply Chain Security - Brandon Lum, Software Engineer, Google
14:07
CNCF [Cloud Native Computing Foundation]
Переглядів 1,3 тис.
The Five Most Dangerous New Attack Techniques and How to Counter Them
46:51
RSA Conference
Переглядів 119 тис.
Securing your software supply chain
7:39
Google Cloud Tech
Переглядів 6 тис.
What Is Vulnerability Management? (Explained By Experts)
16:39
PurpleSec
Переглядів 23 тис.
What is Salesforce (and why is it so good)?
12:47
David K. Liu
Переглядів 455 тис.
Generate SBOMs with Trivy & Scan SBOMs for vulnerabilities
10:16
Aqua Security Open Source
Переглядів 2,9 тис.
МОЙ ПЕРВЫЙ ТЕЛЕФОН - Sony Erricson T280i
18:02
ЗЕ МАККЕРС
Переглядів 67 тис.
Infrared Soldering Iron from Cigarette Lighter
0:58
ALABAYCHIC
Переглядів 1,8 млн
All New Atlas | Boston Dynamics
0:40
Boston Dynamics
Переглядів 5 млн