{"id":11573,"date":"2022-02-09T22:52:10","date_gmt":"2022-02-09T22:52:10","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2022\/02\/09\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\/"},"modified":"2022-02-09T22:52:10","modified_gmt":"2022-02-09T22:52:10","slug":"red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2022\/02\/09\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\/","title":{"rendered":"Red Hat will explore how to manage risk in the digital supply chain during Feb. 15 event"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<br \/><img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/d15shllkswkct0.cloudfront.net\/wp-content\/blogs.dir\/1\/files\/2022\/02\/red-hat-security-series-main-slate-FEB-2022.png\" \/><\/p>\n<div>\n<p><span style=\"font-weight: 400;\">When one major breach technique becomes successful, it\u2019s a sure bet that rapid adoption by threat actors will follow.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This maxim has become more evident following a successful attack on the software supply chain through a\u00a0<\/span><a href=\"https:\/\/siliconangle.com\/2021\/02\/26\/solarwinds-breach-bad-not-learning-far-worse\/\"><span style=\"font-weight: 400;\">breach of SolarWinds Inc.<\/span><\/a><span style=\"font-weight: 400;\"> more than one year ago. Software supply chain attacks\u00a0<\/span><a href=\"https:\/\/techmonitor.ai\/technology\/cybersecurity\/supply-chain-attacks-open-source-software-grew-650-percent-2021#:~:text=Cybercriminals%20are%20compromising%20open%20source,recorded%2012%2C000%20incidents%20in%202021\"><span style=\"font-weight: 400;\">grew 650%<\/span><\/a><span style=\"font-weight: 400;\"> in 2021, according to a<\/span><a href=\"https:\/\/www.sonatype.com\/resources\/state-of-the-software-supply-chain-2021\"> <span style=\"font-weight: 400;\">report<\/span><\/a><span style=\"font-weight: 400;\"> by security provider Sonatype Inc. This was further underscored by the vulnerability\u00a0<\/span><a href=\"https:\/\/siliconangle.com\/2021\/12\/13\/researchers-detect-hundreds-thousands-log4j-cyberattack-attempts\/\"><span style=\"font-weight: 400;\">recently disclosed<\/span><\/a><span style=\"font-weight: 400;\"> in Log4j, a popular Java logging tool.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Red Hat Inc. and theCUBE, SiliconANGLE Media\u2019s livestreaming studio, will tackle these topics and more during the\u00a0<\/span><a href=\"https:\/\/events.cube365.net\/redhat\/digital-risk\"><span style=\"font-weight: 400;\">\u201cHow to Manage Digital Risk by Securing Your Software Supply Chain\u201d<\/span><\/a><span style=\"font-weight: 400;\"> event, airing Feb. 15.<\/span><\/p>\n<h3>\u2018Securing Your Software Supply Chain\u2019 event takes aim at reducing digital risk<\/h3>\n<p><span style=\"font-weight: 400;\">Vulnerabilities in the open-source supply chain make these issues especially troubling based on the widespread use of software tools. The Sonatype data showed that JavaScript developers downloaded\u00a0<\/span><a href=\"https:\/\/techmonitor.ai\/technology\/cybersecurity\/supply-chain-attacks-open-source-software-grew-650-percent-2021#:~:text=Cybercriminals%20are%20compromising%20open%20source,recorded%2012%2C000%20incidents%20in%202021\"><span style=\"font-weight: 400;\">1.5 trillion open-source packages<\/span><\/a><span style=\"font-weight: 400;\"> in 2021. At this scale, the presence of malicious code in just a small percentage of these tools could spread far and wide.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cThe power of the supply chain, as an amplifying factor, is starting to get exploited really well by the attackers,\u201d said\u00a0<\/span><a href=\"https:\/\/www.redhat.com\/en\/authors\/ben-fischer\"><span style=\"font-weight: 400;\">Ben Fischer<\/span><\/a><span style=\"font-weight: 400;\">, emerging security technology advocate at Red Hat Inc., during an interview with theCUBE, SiliconANGLE Media\u2019s livestreaming studio. \u201cIt\u2019s literally exploding in terms of the threats happening in the supply chain attacks. You should be thinking about where software is being downloaded from; there\u2019s lots of sites and lots of ways to get it.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How organizations can avoid and minimize breaches in an enterprise IT environment under attack will be the focus of the\u00a0<\/span><a href=\"https:\/\/events.cube365.net\/redhat\/digital-risk\"><span style=\"font-weight: 400;\">\u201cHow to Manage Digital Risk by Securing Your Software Supply Chain\u201d<\/span><\/a><span style=\"font-weight: 400;\"> event on Feb. 15. The event will feature interviews with experts who will discuss where the greatest threats exist, how to think about open source versus commercial software, and ways that organizations can reduce risks going forward. <\/span><i><span style=\"font-weight: 400;\">(* Disclosure below.)<\/span><\/i><\/p>\n<h3>Transparency and trust<\/h3>\n<p><span style=\"font-weight: 400;\">As described in a\u00a0<\/span><a href=\"https:\/\/www.redhat.com\/en\/blog\/community-we-trust-open-source-software-and-supply-chain-security\"><span style=\"font-weight: 400;\">blog post<\/span><\/a><span style=\"font-weight: 400;\"> by\u00a0<\/span><a href=\"https:\/\/www.linkedin.com\/in\/chris-wright-b733851\"><span style=\"font-weight: 400;\">Chris Wright<\/span><\/a><span style=\"font-weight: 400;\">, Red Hat\u2019s senior vice president and chief technology officer, the company\u2019s philosophy around supply chain security is grounded in an \u201copen approach.\u201d Transparency, partnership and trust are the principles behind what it will take to secure the software supply chain.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Using\u00a0<\/span><a href=\"https:\/\/www.redhat.com\/en\/technologies\/cloud-computing\/openshift\/container-platform\"><span style=\"font-weight: 400;\">OpenShift Container Platform<\/span><\/a><span style=\"font-weight: 400;\"> as the foundation, Red Hat brings together\u00a0<\/span><a href=\"https:\/\/www.redhat.com\/en\/resources\/ve-trusted-software-supply-chain-brief\"><span style=\"font-weight: 400;\">trusted third-party tools<\/span><\/a><span style=\"font-weight: 400;\"> and prescriptive workflows for best practices, including test-driven development and continuous integration\/continuous deployment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The objective is to create a virtual \u201cwarehouse club\u201d where users can shop for the software tool they need without worrying about where it came from or what it might contain, according to Fischer. It is part of the open-source ethos to foster transparency and openness within the community of enterprise developers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cIn that transparency and collaboration there is a review of all of the code that gets submitted,\u201d Fischer said. \u201cYou could download any bit of open-source software that Red Hat sells, and you can run it today. Red Hat plays a role in that we curate that software. We\u2019re trying to pick the best piece of software that we feel we can trust.\u201d<\/span><\/p>\n<h3>Fostering accountability<\/h3>\n<p><span style=\"font-weight: 400;\">In addition to Red Hat\u2019s work to foster trust in the software supply chain, there is a\u00a0<\/span><a href=\"https:\/\/siliconangle.com\/2022\/01\/25\/quest-for-transparency-tech-world-confronts-urgent-challenge-of-securing-the-software-supply-chain-softwaresupplychain\/\"><span style=\"font-weight: 400;\">push within the tech community<\/span><\/a><span style=\"font-weight: 400;\"> for a\u00a0<\/span><a href=\"https:\/\/www.ntia.gov\/SBOM\"><span style=\"font-weight: 400;\">software bill of materials<\/span><\/a><span style=\"font-weight: 400;\">, or SBOM. An\u00a0<\/span><a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\"><span style=\"font-weight: 400;\">Executive Order<\/span><\/a><span style=\"font-weight: 400;\"> issued by the White House in May called for an SBOM as part of a series of recommendations for securing the supply chain.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">More recently, the Linux Foundation\u00a0<\/span><a href=\"https:\/\/www.linuxfoundation.org\/press-release\/the-linux-foundation-releases-the-state-of-software-bill-of-materials-sbom-and-cybersecurity-readiness-research\/\"><span style=\"font-weight: 400;\">released<\/span><\/a><span style=\"font-weight: 400;\"> a \u201cState of Software Bill of Materials and Cybersecurity Readiness\u201d report, which found that while 78% of organizations surveyed expect to produce or consume SBOMs in 2022, only 47% are actively using them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At a minimum, the Linux Foundation report provided an encouraging signal that awareness surrounding SBOMs and the need for software accountability is growing, making Red Hat\u2019s event on Feb. 15 all the more timely.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cJust because you downloaded it from a site, you don\u2019t know who posted it,\u201d Fischer noted. \u201cThe SBOM will give you an understanding of who\u2019s accountable, who actually wrote the software or made the patch or submitted the last update to a branch. At some point, you need to know who did this to verify if something is trustworthy.\u201d<\/span><\/p>\n<h3>Livestream of Red Hat\u2019s \u2018Securing Your Software Supply Chain\u2019 event<\/h3>\n<p><span style=\"font-weight: 400;\">Red Hat\u2019s <\/span><a href=\"https:\/\/events.cube365.net\/redhat\/digital-risk\"><span style=\"font-weight: 400;\">\u201cHow to Manage Digital Risk by Securing Your Software Supply Chain\u201d event<\/span><\/a><span style=\"font-weight: 400;\"> will feature interviews to be broadcast on theCUBE. <\/span><a href=\"https:\/\/events.cube365.net\/redhat\/digital-risk\"><span style=\"font-weight: 400;\">Add this event to your calendar<\/span><\/a><span style=\"font-weight: 400;\"> to watch the event live. Plus, you can watch theCUBE interviews <\/span><a href=\"https:\/\/events.cube365.net\/redhat\/digital-risk\"><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\"> on demand after the live event.<\/span><\/p>\n<h3>How to watch theCUBE interviews<\/h3>\n<p><span style=\"font-weight: 400;\">We offer you various ways to watch Red Hat\u2019s <\/span><a href=\"https:\/\/events.cube365.net\/redhat\/digital-risk\"><span style=\"font-weight: 400;\">\u201cHow to Manage Digital Risk by Securing Your Software Supply Chain\u201d event<\/span><\/a><span style=\"font-weight: 400;\">, including theCUBE\u2019s <\/span><a href=\"https:\/\/events.cube365.net\/redhat\/digital-risk\"><span style=\"font-weight: 400;\">dedicated website<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.youtube.com\/channel\/UCu3Ri8DI1RQLdVtU12uIp1Q\"><span style=\"font-weight: 400;\">YouTube channel<\/span><\/a><span style=\"font-weight: 400;\">. You can also get all the coverage from this year\u2019s events on <\/span><a href=\"http:\/\/siliconangle.com\/\"><span style=\"font-weight: 400;\">SiliconANGLE<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h4>TheCUBE Insights podcast<\/h4>\n<p><span style=\"font-weight: 400;\">SiliconANGLE also has podcasts available of archived interview sessions, available on <\/span><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/thecube-insights\/id1378611510?mt=2\"><span style=\"font-weight: 400;\">iTunes<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.stitcher.com\/podcast\/alexander-myerson\/cube-insights\"><span style=\"font-weight: 400;\">Stitcher<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/open.spotify.com\/show\/0hHPDV23kD9p4queBE1UwE\"><span style=\"font-weight: 400;\">Spotify<\/span><\/a><span style=\"font-weight: 400;\">, which you can enjoy while on the go.<\/span><\/p>\n<h3>Guests<\/h3>\n<p><span style=\"font-weight: 400;\">During Red Hat\u2019s <\/span><a href=\"https:\/\/events.cube365.net\/redhat\/digital-risk\"><span style=\"font-weight: 400;\">\u201cHow to Manage Digital Risk by Securing Your Software Supply Chain\u201d event<\/span><\/a><span style=\"font-weight: 400;\">, theCUBE will talk with Red Hat\u2019s Vincent Danen, vice president of product security; Luke Hinds, security engineering lead from the Office of the CTO; and Kirsten Newcomer, director of cloud and DevSecOps strategy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">During the livestream, the CUBE will also talk with Red Hat\u2019s Andrea Hall, specialist solution architect and project manager for security and compliance, and Andrew Block, distinguished architect.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">(* Disclosure: TheCUBE is a paid media partner for the<\/span><\/i><a href=\"https:\/\/events.cube365.net\/redhat\/digital-risk\">\u201c<i><span style=\"font-weight: 400;\">How to Manage Digital Risk by Securing Your Software Supply Chain\u201d event<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">. Neither Red Hat Inc., the sponsor of theCUBE\u2019s event coverage, nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)<\/span><\/i><\/p>\n<h5>Photo: SiliconANGLE<\/h5>\n<div class=\"silic-after-content\" id=\"silic-1096049518\">\n<hr style=\"border: 1px solid; color: #d8d8d8; height: 0px; margin-top: 20px;\"\/>\n<h3><span style=\"font-size: 16px;\">Show your support for our mission by joining our Cube Club and Cube Event Community of experts. Join the community that includes Amazon Web Services and Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger and many more luminaries and experts.<\/span><\/h3>\n<\/div><\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/siliconangle.com\/2022\/02\/09\/red-hat-will-explore-manage-risk-digital-supply-chain-feb-15-event-softwaresupplychain\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When one major breach technique becomes successful, it\u2019s a sure bet that rapid adoption by threat actors will follow. This maxim has become more evident&#8230;<\/p>\n","protected":false},"author":1,"featured_media":11574,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-11573","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Red Hat will explore how to manage risk in the digital supply chain during Feb. 15 event - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2022\/02\/09\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Red Hat will explore how to manage risk in the digital supply chain during Feb. 15 event - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2022\/02\/09\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-09T22:52:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/02\/red-hat-security-series-main-slate-FEB-2022.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/02\\\/09\\\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/02\\\/09\\\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"Red Hat will explore how to manage risk in the digital supply chain during Feb. 15 event\",\"datePublished\":\"2022-02-09T22:52:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/02\\\/09\\\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\\\/\"},\"wordCount\":1037,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/02\\\/09\\\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/red-hat-security-series-main-slate-FEB-2022.png\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/02\\\/09\\\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/02\\\/09\\\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/02\\\/09\\\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\\\/\",\"name\":\"Red Hat will explore how to manage risk in the digital supply chain during Feb. 15 event - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/02\\\/09\\\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/02\\\/09\\\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/red-hat-security-series-main-slate-FEB-2022.png\",\"datePublished\":\"2022-02-09T22:52:10+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/02\\\/09\\\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/02\\\/09\\\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/02\\\/09\\\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/red-hat-security-series-main-slate-FEB-2022.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/red-hat-security-series-main-slate-FEB-2022.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/02\\\/09\\\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Red Hat will explore how to manage risk in the digital supply chain during Feb. 15 event\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Red Hat will explore how to manage risk in the digital supply chain during Feb. 15 event - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2022\/02\/09\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\/","og_locale":"en_US","og_type":"article","og_title":"Red Hat will explore how to manage risk in the digital supply chain during Feb. 15 event - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2022\/02\/09\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2022-02-09T22:52:10+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/02\/red-hat-security-series-main-slate-FEB-2022.png","type":"image\/png"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/02\/09\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/02\/09\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"Red Hat will explore how to manage risk in the digital supply chain during Feb. 15 event","datePublished":"2022-02-09T22:52:10+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/02\/09\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\/"},"wordCount":1037,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/02\/09\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/02\/red-hat-security-series-main-slate-FEB-2022.png","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2022\/02\/09\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/02\/09\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\/","url":"https:\/\/mailinvest.blog\/index.php\/2022\/02\/09\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\/","name":"Red Hat will explore how to manage risk in the digital supply chain during Feb. 15 event - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/02\/09\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/02\/09\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/02\/red-hat-security-series-main-slate-FEB-2022.png","datePublished":"2022-02-09T22:52:10+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/02\/09\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2022\/02\/09\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/02\/09\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/02\/red-hat-security-series-main-slate-FEB-2022.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/02\/red-hat-security-series-main-slate-FEB-2022.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/02\/09\/red-hat-will-explore-how-to-manage-risk-in-the-digital-supply-chain-during-feb-15-event\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"Red Hat will explore how to manage risk in the digital supply chain during Feb. 15 event"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/11573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=11573"}],"version-history":[{"count":0,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/11573\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/11574"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=11573"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=11573"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=11573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}