Cloud Security Podcast by Google cover image

EP66 Is This Binary Legit? How Google Uses Binary Authorization and Code Provenance

Cloud Security Podcast by Google

00:00

The Blast Radios Question Versus Fix and Seculity Question

"There's always going to be a weak spot. But what we're putting in place is to a single point of failure in your supply thed not to result in disaster," he says. Grite a, having a policy that requires every production deployment to be signed off by your cue engineers and to be scanned by your voability scanner doesn't directly result in disaster. "I live through this every day. So a lot of thisat i think, go without saying."

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app