The CircleCI hack and software supply chain risks
In this episode, Matt breaks down the recent CircleCI hack by visualizing the integrated development environment (IDE) process. In doing so, he points out that not only does source code need to be secure, but also the development process itself in order to prevent incidents like the CircleCI secrets hack.
• Related: Why the CircleCI hack is a red flag
• Special: The State of Supply Chain Security
• Get a free SBOM and supply chain risk analysis