Listen "Ep. 152 How to Fight Threats to the Software Supply Chain"
Episode Synopsis
For the video of this podcast: How to Fight Threats to the Software Supply Chain Follow Fedinsider on LinkedIn The federal government is playing a game of cyber-attack-a-mole with bad actors, constantly adapting to their threats but ultimately driving them to other areas, such as targeting endpoints or applications to find a weak point not being monitored. This week on Feds At the Edge, we are focusing on sophisticated attacks on federal applications and APIs. Jerry Cochran, Deputy Chief Information Officer and Director of the Cybersecurity & DigitalOps Division from Pacific Northwest National Laboratory, shares how the once popular Software Bill of Materials has weakened over the years thanks to the constant change of code. AI can help detect vulnerabilities in dynamic code, but attackers also use AI to find weaknesses. Instead of signature-based approaches, Nate Fountain Deputy CISO from ICE, suggests using behavior analytics to prevent compromised code from exfiltrating data. Tune in on your favorite podcasting platform as our experts discuss the ongoing battle.
More episodes of the podcast Feds at the Edge
Ep. 220 Accelerate AI with Trusted Data
09/10/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.