Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Introduction
00:00 • 3min
Kubernetes Security Response Team
02:42 • 2min
What's the Software Supply Chain?
05:08 • 3min
What Are Some of the Common Supply Chain Attacks?
07:59 • 6min
Do You Need to Scan Docker Images?
13:50 • 5min
When Should I Get Started on Securing My Software Supply Chain?
18:52 • 2min
Software Signing for the Software Supply Chain
20:33 • 6min
The UX of Cryptographic Keys
26:11 • 2min
What Does Let's Encrypt Do?
27:49 • 2min
Let's Encrypt
30:11 • 5min
Six Store
34:59 • 6min
Kubernetes - Signing a Container Image
40:56 • 2min
GitHub
43:10 • 2min
Sixtor Software Signing
45:37 • 3min
Kubernetes Security Training - Is Sixtor a Cloud Native?
48:27 • 2min


