Spy Vs. Spy: How to Use Breakable Dependencies to Your Advantage

Spy Vs. Spy: How to Use Breakable Dependencies to Your Advantage

When a dependency comes along can you break it? Break it good? The reliance on third-party applications can unleash a dependency hell upon your network. How well do you trust the integrity of third party integrations that affect your code, your systems, and any COTS/GOTS you purchase? We will take a look at vulnerabilities that have been exploited and how they broke the perceived security of the network. Looking at the flaws in the trust chain we can see where the weaknesses are introduced and begin to devise ways to exploit them. When you’re leveraging third party applications, and everyone is, you have to ask yourself Do I feel lucky?. Well, do ya, punk?

Presented by