✓ Raspberry Pi or C64 Mini for free
✓ Save up to 520 €
✓ Raspberry Pi oder C64 Mini for free
✓ Bis zu 520 € sparen
More talks in the program:
Maintaining secure versions of third-party libraries is a repetitive and tedious task at best. At worst, with many interdependent internal projects (think microservices) and dozens of layers of transitive dependencies, it is a logistical nightmare. A top-down, ad hoc approach is often used to resolve vulnerable third-party libraries, prioritizing high-severity vulnerabilities or internal projects critical to business functions, but failing to address the larger impact of vulnerabilities. TraceLink is taking a different approach, utilizing the graph structure of interconnected projects to perform security upgrades in an informed order from the bottom up. This talk will explore why the traditional approach is ultimately ineffective and show how the bottom-up approach addresses these shortcomings. It will also introduce open source software that defines an explicit strategy for third-party library version maintenance, aiding in the completion of vital security upgrades and compounding the effects of each upgrade to reduce overall work done.