Explore >> Select a destination


You are here

www.overops.com
| | www.rezilion.com
3.2 parsecs away

Travel
| | This blog post explores the ways in which Application Security Posture Management tools (ASPM) can Help with Software Supply Chain Security.
| | www.syntasso.io
2.8 parsecs away

Travel
| | An IDP is a self-service system with a centralised interface or entry point called an internal developer portal- which is also sometimes referred to as IDP. Through this portal, developers gain access to a pool of tools and resources needed to build, test, and deploy software.
| | ortelius.io
2.9 parsecs away

Travel
| | Ortelius for Post-Deployment Security to Jenkins As software supply chains grow more complex and vulnerabilities emerge faster than ever, Jenkins users face a critical challenge: "How do you keep your deployed applications secure after the build is complete?" Jenkins excels at automating builds, tests, and deployments. But what happens after software reaches production? Most CI/CD tools, including Jenkins, lose visibility once applications go live. This blind spot leaves teams vulnerable to newly disclosed CVEs, exploitable weaknesses that can appear days or weeks after deployment.
| | www.cybereason.com
16.2 parsecs away

Travel
| In this high-stakes game of cat and mouse, the use of artificial intelligence (AI) has emerged as a powerful tool in the fight against cyber threats.