Software supply chain attacks are on the rise as organizations leverage open source software. It gives attackers a potential path to insert malicious code in container images. Organizations need to assess every image’s components for known vulnerabilities and take corrective action.
In this webinar, you will learn that detecting common CVEs in images and blocking their deployment requires answers to the following questions: