Recent high-profile attacks have placed increased emphasis on the software supply chain and the need to understand where code has […]