Media Roundtable
Securing the Software Supply Chain: How to Prevent the Next SolarWinds Attack
Form Header
Form description, sit amet, consectetur et nisl adipiscing elit.
[Form Here]
Media Roundtable
Form description, sit amet, consectetur et nisl adipiscing elit.
[Form Here]
China and Russia are targeting vulnerabilities in the software supply chain to launch attacks against US companies and government agencies. The most infamous of these attacks in recent memory is the SolarWinds breach of 2020. Hackers gained access via a malicious software update in Orion, an IT monitoring platform by SolarWinds. At least 100 organizations were compromised.
Join Paul Roberts, Editor in Chief of The Security Ledger, and an esteemed panel of software security experts as they discuss how to prevent the next SolarWinds attack. They will address questions such as:
Moderator: Paul Roberts, The Security Ledger
Panelists:
Runtime: 57 minutes
Lorem, ipsum dolor sit, amet consectetur adipisicing elit. Accusamus animi nisi sunt fugiat adipisci praesentium rerum explicabo, nostrum, vel porro rem unde, cum ut repudiandae iste, amet ad. Iure, iste!
Totam esse aut perspiciatis autem nam, debitis:
Form description, sit amet, consectetur et nisl adipiscing elit.
[Form Here]
Lorem, ipsum dolor sit, amet consectetur adipisicing elit. Accusamus animi nisi sunt fugiat adipisci praesentium rerum explicabo, nostrum, vel porro rem unde, cum ut repudiandae iste, amet ad. Iure, iste!
Totam esse aut perspiciatis autem nam, debitis:
Form description, sit amet, consectetur et nisl adipiscing elit.
[Form Here]
Quasi qui ducimus fugit eos odit tempora ex nulla tempore, placeat accusantium, explicabo ratione rem voluptatum itaque alias deserunt exercitationem neque dolores repudiandae corporis, quas nemo nostrum debitis. Repudiandae nobis cumque nesciunt iste, dolorum sapiente, impedit nihil voluptatibus, eligendi nisi qui libero commodi magnam.
Top content area. Lorem ipsum dolor sit amet consectetur adipisicing elit. In molestiae esse, sit accusamus ab doloremque tempora maiores officia, odit atque.
Form description, sit amet, consectetur et nisl adipiscing elit.
[Form Here]
Bottom content area. Lorem ipsum dolor sit amet, consectetur adipisicing elit. Nostrum inventore magni facilis suscipit odit unde rerum temporibus nesciunt illo tenetur.
Lorem ipsum, dolor sit amet consectetur adipisicing elit. Temporibus, et, excepturi atque nisi commodi iusto ipsum illum fugit hic necessitatibus similique eum doloremque repellendus nostrum fuga, quod? Neque, amet, ea.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Quaerat dignissimos libero quibusdam adipisci deleniti quae quidem temporibus aliquid sunt. Earum repellat officia, nesciunt dolorem ipsum temporibus aspernatur illo non iusto!
Lorem ipsum dolor sit amet, consectetur adipisicing elit. Quos, ab, aspernatur nemo neque omnis architecto modi id dolores alias quaerat quod similique consequuntur, dolore aperiam autem delectus! Dignissimos, fuga, ratione?
Lorem, ipsum dolor sit amet consectetur adipisicing elit. Aspernatur aut enim, odio vitae incidunt deleniti sit voluptatibus, reiciendis molestiae! Dolorem ratione tenetur, aliquid temporibus sunt laborum optio possimus harum ea.
"Mayhem allows our engineers to easily get started with fuzz testing and find software flaws without knowing much about fuzzing. The learning curve of new tools can be steep, and Mayhem made it as frictionless as possible for our engineers to start finding bugs and gain more assurance in our software."
“Mayhem’s fuzzing tech is unlike any platform I’ve worked with before -- in the best ways possible. Through their native symbolic execution engine in conjunction with their fuzzers, we can feed native binaries that run at our edge and perform behavior analysis at scale."
"Integrating Mayhem into our development process was a breeze, only taking a few minutes to configure and deploy. With great documentation and advanced features not normally found in other platforms, such as network target fuzzing, Mayhem allowed us to easily expand automate testing that would have taken significantly more effort with other solutions"