Explore >> Select a destination


You are here

www.armorcode.com
| | ortelius.io
2.4 parsecs away

Travel
| | Ortelius for Post-Deployment Security to Jenkins As software supply chains grow more complex and vulnerabilities emerge faster than ever, Jenkins users face a critical challenge: "How do you keep your deployed applications secure after the build is complete?" Jenkins excels at automating builds, tests, and deployments. But what happens after software reaches production? Most CI/CD tools, including Jenkins, lose visibility once applications go live. This blind spot leaves teams vulnerable to newly disclosed CVEs, exploitable weaknesses that can appear days or weeks after deployment.
| | www.rezilion.com
1.0 parsecs away

Travel
| | This blog post explores the ways in which Application Security Posture Management tools (ASPM) can Help with Software Supply Chain Security.
| | blog.koi.security
2.5 parsecs away

Travel
| | Deep research and expert insights on software supply chain risk, browser extensions, AI security, MCP threats, and enterprise risks.
| | www.backslash.security
16.4 parsecs away

Travel
| [AI summary] The article discusses Backslash's AI coding AppSec platform, emphasizing visibility, governance, and control, while highlighting their presence at Black Hat and updated privacy policies.