June 23, 2022

How To Secure Your Software Supply Chain

When we work to secure our software supply chain, there are many aspects we must consider.
One of the key aspects is how to attest that I specific image has passed through our supply chain and is indeed the image we think it is and that is hasn’t been tampered with.


We also must consider how to validate images built externally and how to ensure they don’t have malware hidden within them that sometimes may not come up in a simple image scan.


In this demo we discuss and demonstrate, how we can achieve these goals using cosign and Prisma Cloud sandboxing technologies.

Prisma Cloud

Next Videos


28 December, 2023

TeraSky’s 2023: A Year of Triumphs, Teamwork, and Gratitude
Watch Video

6 August, 2023

Healthcare Industry’s Journey to Multi-Cloud Infrastructure with VMware Cloud on AWS
Watch Video

27 July, 2023

Recover Ultra-Large, High Transaction Production SQL Databases in Seconds?
Watch Video
Skip to content