Home » Security Bloggers Network » Wicked Good Development: The Evolution of Supply Chain Attacks
Wicked Good Development: The Evolution of Supply Chain Attacks
Wicked Good Development is dedicated to the future of open source. This space is to learn about the latest in the developer community and talk shop with open source software innovators and experts in the industry.
In this episode, Director of Product Management Sonatype Jamie Whitehouse joins Kadi as guest host. With the unique perspectives of Product Manager Engineering Manager Daryl Handley, Data Scientist Cody Nash, and Principal Engineer AJ Brown, we dissect the evolution of software supply chain attacks and lessons learned. We’ll dive into how credit card fraud detection and supply chain attack detection are similar, the data science behind these systems, and the behavior of the developers.
Listen to the episode
Wicked Good Development is available wherever you find your podcasts. Visit our page on Spotify’s anchor.fm
Show notes
Hosts
- Host- Kadi Grigg @kadigrigg
- Guest co-host – Jamie Whitehouse, Director of Product Management
Panelists
-
A.J. Brown – Principal Engineer @adrianjbrown
-
Cody Nash – Data Scientist
- Darryl Handley – Engineering Manager
References
Transcript
Kadi
Hi, my name’s Kadi Grigg, and welcome to today’s episode of Wicked Good Development. This is a space to learn about the latest in the developer community and talk shop with OSS innovators and experts in the industry.
Jamie
Hey there. My name’s Jamie Whitehouse. I’m the director of product management here at Sonatype, and I’ll be your co-host today. We’ll be talking about the evolution of software supply chain attacks and lessons we’ve learned along the way.
Kadi
Today. We have an amazing team from Sonatype, including principal engineer A.J. Brown, Data Scientist Cody Nash, and Data Services Engineering Manager Darryl Handley. Welcome, all. And thanks for being here.
Darryl
Thanks for having us, Kadi.
Jamie
Before we jump into (Read more...)
*** This is a Security Bloggers Network syndicated blog from Sonatype Blog authored by Kadi Grigg. Read the original post at: https://blog.sonatype.com/wicked-good-development-evolution-supply-chain-attacks