Building Trust in a Zero-Trust Supply Chain World

Securing the Software Supply Chain offers a comprehensive exploration into this critical field. As technical professionals, understanding the evolving landscape of supply chain security is paramount. Understanding what supply chain security is, when and how to implement controls, and why you are doing so, along with the bottom turtle problem, and the concept of trust in a zero-trust world are all key takeaways. By grasping these concepts, and more, we can better protect our software, systems, and users, ultimately fortifying our organizations against the ever-increasing threats in the digital supply chain.

Get your copy of Securing the Software Supply Chain now! Dive deeper into the lessons discussed here, and many more, to ensure your supply chain stays safe and protected.

Being a Better PHP Dev: learning to avoid the common mistakes

This book will upgrade your PHP code by highlighting the errors, antipatterns, and security weaknesses common to PHP applications.

Learn about Cryptography by Learning how to Break It

Implementing and Exploiting Cryptography details dozens of practical cryptographic implementations and then breaks down the flaws that adversaries use to exploit them.

Proactive Security: leveraging Azure Security Services

This excerpt covers cybersecurity as an infinite game, the shared responsibility model, Azure security services, the threat landscape, cloud security challenges, the Zero Trust security model, and the defense in depth concept.

Policies and Procedures for Secure Access

From AWS Security by Dylan Shields

This article deals with securing access to your AWS account.

Managing AI and ML Projects: a primer for success

An excerpt from Managing Machine Learning Projects by Simon Thompson

Managing Machine Learning Projects will teach you to guide machine learning projects from design to production—no machine learning experience required!

Read this article if you’re a project manager who works with machine learning applications.

What is Cryptography?

An excerpt from Secret Key Cryptography by Frank Rubin

This article covers:

•       Basic terms used in cryptography

•       What is an unbreakable cipher?

•       What are the different types of cryptography?

Read it if you’re interested in cryptography.

Putting the Sec in DevSecOps

From the Application Security Program Handbook by Derek Fisher

This article discusses where security fits into the DevOps process along with some common approaches.

Read it if you want to learn more about baking security into DevOps.

The Cryptographer’s Toolbox

From Secret Key Cryptography by Frank Rubin

This article covers:

·  The rating system used for ciphers

·  Substitution ciphers

·  Transposition ciphers

·  Fractionation, breaking letters into smaller units

·  Pseudorandom number generators

© 2024 Manning — Design Credits