The Secure Developer cover image

Securing The Modern Software Supply Chain With Adrian Ludwig

The Secure Developer

CHAPTER

Secure Developer

Adrian: I think it's going to depend on your specific environment, but it could be serverless. The second sort of ambition is legitimate security boundaries between those components. So being able to have confidence that any exploitation is isolated and contained only within those areas. And so maybe again, maybe that's base image and the base images are actually isolating them out in a serverless kind of model.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner