<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1076912843267184&amp;ev=PageView&amp;noscript=1">

Educational Series

Software Package Deconstruction Analyzing Risks To Your Software Supply Chain

Software Package Deconstruction

About the Series

In each episode of our application security series we will deconstruct, analyze, and expose hidden risks inside some of the largest most complex software packages. App Sec and Dev Teams will see our Software Supply Chain Security platform in action and how it provides teams with new found confidence and the ability to make Go/No Go software release decisions based on the most comprehensive view of software risk in the industry.
0

Deconstructing Video Conferencing Software: GoToMeeting & BlueJeans

GoToMeeting and BlueJeans Meet are two popular video conferencing tools, relied on by organizations of all sizes for global communication. But what threats and risks are lurking beneath the code? How are these standard tools impacting an enterprise's security posture? What does the code tell us about the build quality and risk profile?

In this episode, Tim Stahl deconstructs these video conferencing tools, exposing the threats hidden within, and discusses how your organization can address these potential threats.

Continue reading
0

Deconstructing Enterprise VPNs: SonicWall, Check Point & OpenVPN

Knowing how your VPN tools are constructed, whether they exhibit any suspicious functionality, contain vulnerabilities and outdated components, or represent a risk to the data they are meant to protect is critical. Trust but verify! 

Watch as Tim Stahl deconstructs these common tools, exposing the threats hidden within, and discusses how your organization can address these potential threats.

Continue reading
0

Reducing False Positives in the SOC through Software Analysis

On Demand
Software supply chain analysis can reveal important information that security teams can leverage to tune detections across security solutions before deploying new software. Preventing false positives, and time wasted doing investigations related to expected application behaviors (EDR detections) and network traffic elements, can save significant resources for today’s overworked security teams.
 
Continue reading
0

Deconstructing Docker Desktop Software Package

On Demand
In this episode, Tim will take a look at one of the most popular container related applications: Docker Desktop. Container security involves more than containers... it encompasses the tools used to create and manage them. The tools used for any type of development, security or administration functions are often overlooked elements of an enterprise's attack surface.
 
Continue reading
0

Deconstructing Crypto-Wallet Software Packages

On Demand
In this episode, Tim will leverage several software supply chain analysis concepts to perform comparisons across similar crypto-wallet software packages, highlighting the risks and threats from within the packages to everyday users. These elements can be used to assess a vendor's overall “build quality” and the level of risk inherent in their software pipeline across products.
 
Continue reading

Subscribe

Sign up now to receive the latest weekly
news from ReveringLabs

Get Started
Request a DEMO

Learn more about how ReversingLabs can help your company.

REQUEST A DEMO