3 Ways Detecting Software Tampering Differs From Finding Vulnerabilities

Presented by

Jasmine Noel, Sr. Product & Solutions Marketing, ReversingLabs

About this talk

The risk of supply chain attacks is only increasing as malicious actors target development environments and delivery processes to morph trusted software into a weapon. Today various stages of supply chain attacks can be executed with tampered software or malware masquerading as trusted applications and updates. During this webinar, Jasmine Noel, Sr. Product & Solutions Marketing, will cover why existing application security testing and software composition analysis have struggled to reliably detect indicators of tampering, the differences between tampering and vulnerabilities, and the three tampering detection techniques required to improve visibility across the software supply chain. This will include covering which indicators must be detected, what software artifacts must be assessed, and when assessments must occur.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (19)
Subscribers (1444)
ReversingLabs is the leading provider of explainable threat intelligence solutions that shed the necessary light on complex file-based threats for enterprises stretched for time and expertise. Its hybrid-cloud Titanium Platform enables digital business resiliency, protects against new modern architecture exposures, and automates manual SOC processes with a transparency that arms junior analysts to confidently take action.