Chapters
Transcript
Episode notes
1 2 3 4 5
Introduction
00:00 • 5min
How to Create an S-Bomb That Can Be Aggregated for Metadata
05:06 • 2min
The Role of Open Source Software Repositories in Security
07:33 • 2min
How to Verify the Veracity of Open Source Components
09:55 • 4min
How to Be Effective With All the Tools in the World
14:14 • 5min