:
Skip Navigation
Webinar On-Demand | Video

Govern Malicious Risk From Entering Your Software Supply Chain Infrastructure

In this 30 minute presentation, you'll learn how to identify and block security vulnerabilities in applications like Log4j, Solarwinds, and CodeCov attacks, find vulnerabilities in the software you've built, and more.

Govern Malicious Risk From Entering Your Software Supply Chain Infrastructure

Feat. Austin Becker

SHARE

Headshot_Hexagon_Austin_Becker@2x

Austin Becker

Solutions Engineer