Videos
        

June 23, 2022

How To Secure Your Software Supply Chain

When we work to secure our software supply chain, there are many aspects we must consider.
One of the key aspects is how to attest that I specific image has passed through our supply chain and is indeed the image we think it is and that is hasn’t been tampered with.

 

We also must consider how to validate images built externally and how to ensure they don’t have malware hidden within them that sometimes may not come up in a simple image scan.

 

In this demo we discuss and demonstrate, how we can achieve these goals using cosign and Prisma Cloud sandboxing technologies.

Tags:
Prisma Cloud
cosign
Share:

Next Videos

Videos
      

13 July, 2022

TeraSky: Future-proofing an Educational Organization
Watch Video
Videos
      

15 March, 2022

VMware Tanzu Application Platform – Expert Panel Discussion
Watch Video
Videos
      

16 December, 2021

How TeraSky helped Varonis to present a Self-Service Portal for Developer Labs, using VMware vRealize Automation (vRA)
Watch Video