Video interview with Information Security Media Group at Nullcon Goa 2026 on software supply chain risk beyond dependency management and vendor NDAs.
Key Topics
- Why the real attack surface spans browser extensions, developer tooling, and cloud deployment—not just dependencies
- Visibility gaps: data flows, active cloud services, and third-party relationship chains
- Zero trust as largely aspirational and what genuine implementation requires
- Enabling AI adoption without surrendering control over risk
- Attack surface reduction through standardization over sprawling, redundant tool sets