<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1076912843267184&amp;ev=PageView&amp;noscript=1">

Educational Series

Software Package Deconstruction Analyzing Risks To Your Software Supply Chain

Software Package Deconstruction

About the Series

In each episode of our application security series we will deconstruct, analyze, and expose hidden risks inside some of the largest most complex software packages. App Sec and Dev Teams will see our Software Supply Chain Security platform in action and how it provides teams with new found confidence and the ability to make Go/No Go software release decisions based on the most comprehensive view of software risk in the industry.
0

Reducing False Positives in the SOC through Software Analysis

On Demand
Software supply chain analysis can reveal important information that security teams can leverage to tune detections across security solutions before deploying new software. Preventing false positives, and time wasted doing investigations related to expected application behaviors (EDR detections) and network traffic elements, can save significant resources for today’s overworked security teams.
 
Continue reading
0

Deconstructing Docker Desktop Software Package

On Demand
In this episode, Tim will take a look at one of the most popular container related applications: Docker Desktop. Container security involves more than containers... it encompasses the tools used to create and manage them. The tools used for any type of development, security or administration functions are often overlooked elements of an enterprise's attack surface.
 
Continue reading
0

Deconstructing Crypto-Wallet Software Packages

On Demand
In this episode, Tim will leverage several software supply chain analysis concepts to perform comparisons across similar crypto-wallet software packages, highlighting the risks and threats from within the packages to everyday users. These elements can be used to assess a vendor's overall “build quality” and the level of risk inherent in their software pipeline across products.
 
Continue reading
0

Deconstructing Tabby & Notepad++

On Demand
Third party risk management (TPRM) using behaviors and network traffic capabilities to assess common open source tools. These packages represent an overlooked link in the software supply chain, but one that can be addressed with minimal effort provided the necessary visibility.
 
Continue reading
0

Analyzing the 3CX Software Package

On Demand
In this first episode the 3CX software package and recent supply chain attack is analyzed using the ReversingLabs Software Supply Chain Security Platform. Tim deconstructs the 3CX software package, highlights critical red flags, and shows how you can apply these processes to your own secure build process.
 
Continue reading

Subscribe

Sign up now to receive the latest weekly
news from ReveringLabs

Get Started
Request a DEMO

Learn more about how ReversingLabs can help your company.

REQUEST A DEMO