The Secure Developer cover image

Securing The Modern Software Supply Chain With Adrian Ludwig

The Secure Developer

00:00

Secure Developer

Adrian: I think it's going to depend on your specific environment, but it could be serverless. The second sort of ambition is legitimate security boundaries between those components. So being able to have confidence that any exploitation is isolated and contained only within those areas. And so maybe again, maybe that's base image and the base images are actually isolating them out in a serverless kind of model.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app