blogs.vmware.com/opensource/2021/08/05/first-steps-for-securing-the-software-supply-chain-part-2

Preview meta tags from the blogs.vmware.com website.

Linked Hostnames

12

Thumbnail

Search Engine Appearance

Google

https://blogs.vmware.com/opensource/2021/08/05/first-steps-for-securing-the-software-supply-chain-part-2

First Steps for Securing the Software Supply Chain – Part 2

In part 2 of our series, we discuss how understanding & maintaining the dependencies we ingest into our releases can help secure the software supply chain.



Bing

First Steps for Securing the Software Supply Chain – Part 2

https://blogs.vmware.com/opensource/2021/08/05/first-steps-for-securing-the-software-supply-chain-part-2

In part 2 of our series, we discuss how understanding & maintaining the dependencies we ingest into our releases can help secure the software supply chain.



DuckDuckGo

https://blogs.vmware.com/opensource/2021/08/05/first-steps-for-securing-the-software-supply-chain-part-2

First Steps for Securing the Software Supply Chain – Part 2

In part 2 of our series, we discuss how understanding & maintaining the dependencies we ingest into our releases can help secure the software supply chain.

  • General Meta Tags

    11
    • title
      First Steps for Securing the Software Supply Chain – Part 2
    • charset
      utf-8
    • x-ua-compatible
      ie=edge
    • viewport
      width=device-width, initial-scale=1
    • robots
      index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
  • Open Graph Meta Tags

    10
    • US country flagog:locale
      en_US
    • og:type
      article
    • og:title
      First Steps for Securing the Software Supply Chain – Part 2
    • og:description
      In part 2 of our series, we discuss how understanding & maintaining the dependencies we ingest into our releases can help secure the software supply chain.
    • og:url
      https://blogs.vmware.com/opensource/2021/08/05/first-steps-for-securing-the-software-supply-chain-part-2/
  • Twitter Meta Tags

    5
    • twitter:card
      summary_large_image
    • twitter:label1
      Written by
    • twitter:data1
      Joshua Lock
    • twitter:label2
      Est. reading time
    • twitter:data2
      8 minutes
  • Link Tags

    18
    • EditURI
      https://blogs.vmware.com/opensource/xmlrpc.php?rsd
    • alternate
      https://blogs.vmware.com/opensource/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fblogs.vmware.com%2Fopensource%2F2021%2F08%2F05%2Ffirst-steps-for-securing-the-software-supply-chain-part-2%2F
    • alternate
      https://blogs.vmware.com/opensource/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fblogs.vmware.com%2Fopensource%2F2021%2F08%2F05%2Ffirst-steps-for-securing-the-software-supply-chain-part-2%2F&format=xml
    • apple-touch-icon
      https://blogs.vmware.com/opensource/wp-content/uploads/sites/96/2017/01/cropped-OSPO_logo_big.png?w=180
    • canonical
      https://blogs.vmware.com/opensource/2021/08/05/first-steps-for-securing-the-software-supply-chain-part-2/

Emails

1
  • ?subject=First Steps for Securing the Software Supply Chain – Part 2&body=https://blogs.vmware.com/opensource/2021/08/05/first-steps-for-securing-the-software-supply-chain-part-2/

Links

34