
blogs.vmware.com/opensource/2021/08/05/first-steps-for-securing-the-software-supply-chain-part-2
Preview meta tags from the blogs.vmware.com website.
Linked Hostnames
12- 15 links toblogs.vmware.com
- 7 links togithub.com
- 2 links totheupdateframework.io
- 2 links totwitter.com
- 1 link toblog.npmjs.org
- 1 link tocloud.google.com
- 1 link tocommunity.broadcom.com
- 1 link toin-toto.io
Thumbnail

Search Engine Appearance
https://blogs.vmware.com/opensource/2021/08/05/first-steps-for-securing-the-software-supply-chain-part-2
First Steps for Securing the Software Supply Chain – Part 2
In part 2 of our series, we discuss how understanding & maintaining the dependencies we ingest into our releases can help secure the software supply chain.
Bing
First Steps for Securing the Software Supply Chain – Part 2
https://blogs.vmware.com/opensource/2021/08/05/first-steps-for-securing-the-software-supply-chain-part-2
In part 2 of our series, we discuss how understanding & maintaining the dependencies we ingest into our releases can help secure the software supply chain.
DuckDuckGo

First Steps for Securing the Software Supply Chain – Part 2
In part 2 of our series, we discuss how understanding & maintaining the dependencies we ingest into our releases can help secure the software supply chain.
General Meta Tags
11- titleFirst Steps for Securing the Software Supply Chain – Part 2
- charsetutf-8
- x-ua-compatibleie=edge
- viewportwidth=device-width, initial-scale=1
- robotsindex, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
Open Graph Meta Tags
10og:locale
en_US- og:typearticle
- og:titleFirst Steps for Securing the Software Supply Chain – Part 2
- og:descriptionIn part 2 of our series, we discuss how understanding & maintaining the dependencies we ingest into our releases can help secure the software supply chain.
- og:urlhttps://blogs.vmware.com/opensource/2021/08/05/first-steps-for-securing-the-software-supply-chain-part-2/
Twitter Meta Tags
5- twitter:cardsummary_large_image
- twitter:label1Written by
- twitter:data1Joshua Lock
- twitter:label2Est. reading time
- twitter:data28 minutes
Link Tags
18- EditURIhttps://blogs.vmware.com/opensource/xmlrpc.php?rsd
- alternatehttps://blogs.vmware.com/opensource/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fblogs.vmware.com%2Fopensource%2F2021%2F08%2F05%2Ffirst-steps-for-securing-the-software-supply-chain-part-2%2F
- alternatehttps://blogs.vmware.com/opensource/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fblogs.vmware.com%2Fopensource%2F2021%2F08%2F05%2Ffirst-steps-for-securing-the-software-supply-chain-part-2%2F&format=xml
- apple-touch-iconhttps://blogs.vmware.com/opensource/wp-content/uploads/sites/96/2017/01/cropped-OSPO_logo_big.png?w=180
- canonicalhttps://blogs.vmware.com/opensource/2021/08/05/first-steps-for-securing-the-software-supply-chain-part-2/
Emails
1- ?subject=First Steps for Securing the Software Supply Chain – Part 2&body=https://blogs.vmware.com/opensource/2021/08/05/first-steps-for-securing-the-software-supply-chain-part-2/
Links
34- https://blog.npmjs.org/post/180565383195/details-about-the-event-stream-incident
- https://blogs.vmware.com
- https://blogs.vmware.com/opensource
- https://blogs.vmware.com/opensource/2021/07/27/first-steps-for-securing-the-software-supply-chain-part-1
- https://blogs.vmware.com/opensource/2023/05/17/deprecating-an-open-source-project-part-2