
blogs.vmware.com/opensource/2021/07/27/first-steps-for-securing-the-software-supply-chain-part-1
Preview meta tags from the blogs.vmware.com website.
Linked Hostnames
17- 16 links toblogs.vmware.com
- 4 links toreproducible-builds.org
- 2 links toguix.gnu.org
- 2 links totwitter.com
- 1 link tobazel.build
- 1 link tobootstrappable.org
- 1 link tocommunity.broadcom.com
- 1 link togithub.com
Thumbnail

Search Engine Appearance
https://blogs.vmware.com/opensource/2021/07/27/first-steps-for-securing-the-software-supply-chain-part-1
First Steps for Securing the Software Supply Chain – Part 1
In the first of this two part series, discover how some basic principles and practices like enabling MFA can help secure software supply chains.
Bing
First Steps for Securing the Software Supply Chain – Part 1
https://blogs.vmware.com/opensource/2021/07/27/first-steps-for-securing-the-software-supply-chain-part-1
In the first of this two part series, discover how some basic principles and practices like enabling MFA can help secure software supply chains.
DuckDuckGo

First Steps for Securing the Software Supply Chain – Part 1
In the first of this two part series, discover how some basic principles and practices like enabling MFA can help secure software supply chains.
General Meta Tags
11- titleFirst Steps for Securing the Software Supply Chain – Part 1
- charsetutf-8
- x-ua-compatibleie=edge
- viewportwidth=device-width, initial-scale=1
- robotsindex, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
Open Graph Meta Tags
10og:locale
en_US- og:typearticle
- og:titleFirst Steps for Securing the Software Supply Chain – Part 1
- og:descriptionIn the first of this two part series, discover how some basic principles and practices like enabling MFA can help secure software supply chains.
- og:urlhttps://blogs.vmware.com/opensource/2021/07/27/first-steps-for-securing-the-software-supply-chain-part-1/
Twitter Meta Tags
5- twitter:cardsummary_large_image
- twitter:label1Written by
- twitter:data1Joshua Lock
- twitter:label2Est. reading time
- twitter:data27 minutes
Link Tags
17- EditURIhttps://blogs.vmware.com/opensource/xmlrpc.php?rsd
- alternatehttps://blogs.vmware.com/opensource/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fblogs.vmware.com%2Fopensource%2F2021%2F07%2F27%2Ffirst-steps-for-securing-the-software-supply-chain-part-1%2F
- alternatehttps://blogs.vmware.com/opensource/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fblogs.vmware.com%2Fopensource%2F2021%2F07%2F27%2Ffirst-steps-for-securing-the-software-supply-chain-part-1%2F&format=xml
- apple-touch-iconhttps://blogs.vmware.com/opensource/wp-content/uploads/sites/96/2017/01/cropped-OSPO_logo_big.png?w=180
- canonicalhttps://blogs.vmware.com/opensource/2021/07/27/first-steps-for-securing-the-software-supply-chain-part-1/
Emails
1- ?subject=First Steps for Securing the Software Supply Chain – Part 1&body=https://blogs.vmware.com/opensource/2021/07/27/first-steps-for-securing-the-software-supply-chain-part-1/
Links
37- https://bazel.build
- https://blogs.vmware.com
- https://blogs.vmware.com/opensource
- https://blogs.vmware.com/opensource/2021/02/11/musings-on-supply-chain-security
- https://blogs.vmware.com/opensource/2021/08/05/first-steps-for-securing-the-software-supply-chain-part-2