Webinar On-Demand | Video

Govern Malicious Risk From Entering Your Software Supply Chain Infrastructure

In this 30 minute presentation, you'll learn how to identify and block security vulnerabilities in applications like Log4j, Solarwinds, and CodeCov attacks, find vulnerabilities in the software you've built, and more.

Govern Malicious Risk From Entering Your Software Supply Chain Infrastructure

Feat. Adam Such

SHARE

Headshot_Hexagon_Adama_Such@2x

Adam Such

Principal Solution Architect