TNS
VOXPOP
Which agile methodology should junior developers learn?
Agile methodology breaks projects into sprints, emphasizing continuous collaboration and improvement.
Scrum
0%
Kanban
0%
Scrumban (a combination of Scrum and Kanban)
0%
Extreme Programming (XP)
0%
Other methodology
0%
Bah, Waterfall was good enough for my elders, it is good enough for me
0%
Junior devs shouldn’t think about development methodologies.
0%
CI/CD / Security / Software Development

New Ebook: A Blueprint for Supply Chain Security

Get the fundamentals of what you need to protect your software all through its life cycle, in the New Stack's latest ebook. Sponsored by Red Hat.
Oct 4th, 2022 6:08am by
Featued image for: New Ebook: A Blueprint for Supply Chain Security

Managing today’s software — composed of a combination of open source code, in-house created code, and third-party code — has elevated application risk from design and build through production. Now, with more points of vulnerability within today’s software supply chain, the number of attacks has grown exponentially.

In fact, one-fifth of breaches that occurred between March of 2021 and 2022 were caused by a supply chain compromise that resulted from a business partner, such as a supplier, according to a study from the Ponemon Institute and IBM.

As bad actors use more sophisticated methods to exploit code, it is anticipated that by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains, a three-fold increase from 2021, according to Gartner.

In this ebook, B. Cameron Gain, a longtime contributor to The New Stack, provides a glimpse into the threat landscape of containerized applications and offers a blueprint for software supply chain security. He outlines the areas organizations need to protect as they build, change and deploy applications, with a best practice checklist to cover all stages of the software lifecycle.

“A Blueprint for Supply Chain Security” provides valuable insight into:

  • What the software supply chain security is.
  • Why the traditional approach of “patching” applications doesn’t work for containerized applications.
  • How guarding against human error decreases the exploitation of the security supply chain.
  • Software bills of materials (SBOMs), supply-chain levels for software artifacts (SLSA) and other best practices.
  • How a “shift left” strategy can secure the software supply chain, even before a developer begins their work.

Get your free download now.

Thank you to our sponsor, Red Hat Advanced Cluster Security for Kubernetes, for making this ebook possible.

Logo at 620 px for Red Hat advanced cluster security for Kubernetes

Group Created with Sketch.
TNS owner Insight Partners is an investor in: The New Stack.
THE NEW STACK UPDATE A newsletter digest of the week’s most important stories & analyses.