September 23, 2021 at 1 PM

3 Ways Detecting Software Tampering Differs From Finding Software Vulnerabilities

Online
3 Ways Detecting Software Tampering Differs From Finding Software Vulnerabilities
How to expand security visibility to reduce software supply chain risk
The risk of supply chain attacks is only increasing as malicious actors target development environments and delivery processes to morph trusted software into a weapon. Today various stages of supply chain attacks can be executed with tampered software or malware masquerading as trusted applications and updates.

During this webinar, Jasmine Noel, Sr. Product & Solutions Marketing, will cover why existing application security testing and software composition analysis have struggled to reliably detect indicators of tampering, the differences between tampering and vulnerabilities, and the three tampering detection techniques required to improve visibility across the software supply chain. This will include covering which indicators must be detected, what software artifacts must be assessed, and when assessments must occur.