
Securing The Modern Software Supply Chain With Adrian Ludwig
The Secure Developer
Secure Developer
Adrian: I think it's going to depend on your specific environment, but it could be serverless. The second sort of ambition is legitimate security boundaries between those components. So being able to have confidence that any exploitation is isolated and contained only within those areas. And so maybe again, maybe that's base image and the base images are actually isolating them out in a serverless kind of model.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.