Attacks on the OS supply chain are becoming more sophisticated. What are the essential first steps, and what should you focus on in the beginning? This raises the question of suitable methods and tools. At the same time, the company's strategic orientation must be included in this security strategy.
A question occurred to me that I get asked again and again at conferences, meetups or workshops: The question is almost always: ####What are the quick wins or low hanging fruits if you want to deal more with the topic of security in software development? And I want to answer this question right now!
Learn for free, join the best tech learning community for a price of a pumpkin latte.
Event notifications, weekly newsletter
Delayed access to all content
Immediate access to Keynotes & Panels
Access to Circle community platform
Immediate access to all content
Courses, quizes & certificates
Community chats