Cloud Security Podcast cover image

What is SBOM, iBOM?

Cloud Security Podcast

00:00

Is It a Sur Injection?

Security expert: Use the i c d, use the cloud. Do it securely by shifting left. For enterprise iseves information being used to drive valley streams to priortize security,. sorti tories. She i think it would deafin be but i wonder if something like a compliance were needed for this? I'm just thinking too, if some kind of eor bomb or acid management figured out earlier, probemce would not be.

Play episode from 33:28
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app