Software Supply Chain Security: More Than Open Source | On-demand Webinar | Harness Resources
Webinar: On-Demand
Webinar: Upcoming Event
Most security teams begin their software supply chain journey with SCA tools to manage open source risk and then stop there. But modern applications depend on far more than third-party libraries. From container images and build artifacts to CI/CD pipelines and AI models, today's software supply chain encompasses an entire ecosystem of dependencies that attackers are actively exploiting.
In this OnDemand session, you'll discover why addressing open source vulnerabilities is just the first step in securing your software supply chain. We'll examine the critical blind spots that emerge after SCA implementation including artifact integrity, pipeline security, container supply chain attacks, and the emerging risks from AI components and models. Watch now to learn practical strategies for extending your supply chain security program beyond dependency scanning to protect the full lifecycle of software delivery, from code to cloud to production.
Key Takeaways:
Why SCA alone leaves critical supply chain risks unaddressed
The expanding attack surface: containers, artifacts, pipelines, and AI components
Practical next steps for building comprehensive supply chain security
Real-world examples of post-SCA supply chain compromises and how to prevent them
In this live webinar, DZone and Harness break down how teams are combining pipelines and feature flags to bring structure, visibility, and control back to software rollouts. You’ll learn how progressive delivery patterns help standardize releases, reduce blast radius, and make rollouts safer without slowing teams down.