Application Isolation, Zero trust

Securing The Enterprise Software Supply Chain – Harry Sverdlove – PSW #678

December 30, 2020

Sponsored By

sponsor Visit for more information!

SolarWinds is just the latest example of how the enterprise software supply chain, when compromised, can be used successfully by attackers. These coordinated and well-managed attacks prey on trust, so how can we trust our enterprise software?

This segment is sponsored by Edgewise Networks.

Visit to learn more about them! Visit for all the latest episodes!

Full Episode Show Notes

Securing The Enterprise Software Supply Chain



[caption id="attachment_210" align="alignleft" width="120"]Joff Thyer Joff Thyer - Security Analyst[/caption] [caption id="attachment_210" align="alignleft" width="120"]Jeff Man Jeff Man - Sr. InfoSec Consultant[/caption] [caption id="attachment_210" align="alignleft" width="120"]Larry Pesce Larry Pesce - Senior Managing Consultant and Director of Research[/caption] [caption id="attachment_210" align="alignleft" width="120"]Lee Neely Lee Neely - Senior Cyber Analyst [/caption] [caption id="attachment_210" align="alignleft" width="120"]Paul Asadoorian Paul Asadoorian - Founder/CIO[/caption] [caption id="attachment_210" align="alignleft" width="120"]Tyler Robinson Tyler Robinson - Managing Director of Network Operations[/caption]


[caption id="attachment_210" align="alignleft" width="120"]Harry Sverdlove Harry Sverdlove - Chief Technologist [/caption]


  • Do you have a specific guest or topic that you want us to cover on one of the shows? Submit your suggestions for guests by visiting and completing the form! We review suggestions monthly and will reach out to you once reviewed!

prestitial ad