blogs.vmware.com/opensource/2021/07/27/first-steps-for-securing-the-software-supply-chain-part-1

Preview meta tags from the blogs.vmware.com website.

Linked Hostnames

17

Thumbnail

Search Engine Appearance

Google

https://blogs.vmware.com/opensource/2021/07/27/first-steps-for-securing-the-software-supply-chain-part-1

First Steps for Securing the Software Supply Chain – Part 1

In the first of this two part series, discover how some basic principles and practices like enabling MFA can help secure software supply chains.



Bing

First Steps for Securing the Software Supply Chain – Part 1

https://blogs.vmware.com/opensource/2021/07/27/first-steps-for-securing-the-software-supply-chain-part-1

In the first of this two part series, discover how some basic principles and practices like enabling MFA can help secure software supply chains.



DuckDuckGo

https://blogs.vmware.com/opensource/2021/07/27/first-steps-for-securing-the-software-supply-chain-part-1

First Steps for Securing the Software Supply Chain – Part 1

In the first of this two part series, discover how some basic principles and practices like enabling MFA can help secure software supply chains.

  • General Meta Tags

    11
    • title
      First Steps for Securing the Software Supply Chain – Part 1
    • charset
      utf-8
    • x-ua-compatible
      ie=edge
    • viewport
      width=device-width, initial-scale=1
    • robots
      index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
  • Open Graph Meta Tags

    10
    • US country flagog:locale
      en_US
    • og:type
      article
    • og:title
      First Steps for Securing the Software Supply Chain – Part 1
    • og:description
      In the first of this two part series, discover how some basic principles and practices like enabling MFA can help secure software supply chains.
    • og:url
      https://blogs.vmware.com/opensource/2021/07/27/first-steps-for-securing-the-software-supply-chain-part-1/
  • Twitter Meta Tags

    5
    • twitter:card
      summary_large_image
    • twitter:label1
      Written by
    • twitter:data1
      Joshua Lock
    • twitter:label2
      Est. reading time
    • twitter:data2
      7 minutes
  • Link Tags

    17
    • EditURI
      https://blogs.vmware.com/opensource/xmlrpc.php?rsd
    • alternate
      https://blogs.vmware.com/opensource/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fblogs.vmware.com%2Fopensource%2F2021%2F07%2F27%2Ffirst-steps-for-securing-the-software-supply-chain-part-1%2F
    • alternate
      https://blogs.vmware.com/opensource/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fblogs.vmware.com%2Fopensource%2F2021%2F07%2F27%2Ffirst-steps-for-securing-the-software-supply-chain-part-1%2F&format=xml
    • apple-touch-icon
      https://blogs.vmware.com/opensource/wp-content/uploads/sites/96/2017/01/cropped-OSPO_logo_big.png?w=180
    • canonical
      https://blogs.vmware.com/opensource/2021/07/27/first-steps-for-securing-the-software-supply-chain-part-1/

Emails

1
  • ?subject=First Steps for Securing the Software Supply Chain – Part 1&body=https://blogs.vmware.com/opensource/2021/07/27/first-steps-for-securing-the-software-supply-chain-part-1/

Links

37