Skip to content

Commit dd500a9

Browse files
committed
Signed-off-by: tracyragan <[email protected]>
1 parent 51d3406 commit dd500a9

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

content/en/_index.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Code-level vulnerabilities pose a significant risk in the intricate landscape of
3434

3535
Many IT teams struggle to respond to threats due to the fragmented nature of decoupled, cloud-native architecture. [Sonatype’s 2024 Report](https://www.sonatype.com/en/press-releases/sonatypes-10th-annual-state-of-the-software-supply-chain-report) shows a 156% increase in open-source package vulnerabilities, exceeding 512k, with 80% of them unaddressed for over a year. Ortelius streamlines the remediation process by showing where impacted open-sources packages are running across the infrastructure for continuous package remediation.
3636

37-
The Ortelius Community, managed by the [Continuous Delivery Foundation](https://cd.foundation), maintains the latest version, with corporate support from [DeployHub](https://www.deployhub.com).
37+
The Ortelius Community, managed by the [Continuous Delivery Foundation](https://cd.foundation), maintains the latest version, with corporate support from DeployHub a [Continuous Vulnerability Management](https://www.deployhub.com) platform designed to expedite remediation patches.
3838

3939
With Ortelius, you can easily answer the question, “where is Log4J running?”
4040

content/en/blog/contributors/DataNeededforDevSecOpsAI.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ author: Tracy Ragan
1515

1616
As IT teams strive to bolster software supply chains against hidden vulnerabilities in open-source and third-party components, the demand for smart, streamlined, and automated DevSecOps pipelines is soaring. As monolithic applications evolve into intricate, decoupled parts, navigating the security landscape becomes increasingly complex.
1717

18-
To address these challenges, DevSecOps automation is stepping in to streamline software security tasks, sparing IT teams from drowning in manual work. The integration of 'applied' AI into DevOps heralds the dawn of next-generation DevSecOps pipelines, harnessing a wealth of data sources to refine processes, empower decision-making, and enhance overall efficiency.
18+
To address these challenges, DevSecOps automation is stepping in to streamline software security tasks, sparing IT teams from drowning in manual work. The integration of 'applied' AI into DevOps heralds the dawn of next-generation DevSecOps pipelines, harnessing a wealth of data sources to refine processes, empower decision-making, and perform [continuous vulnerability management](https://www.deployhub.com/), critical to weathering the code-level cybersecurity storm.
1919

2020
At Ortelius, our focus lies in gathering and centralizing data from various DevSecOps processes to forge the path towards the next era of DevSecOps pipelines. Modern pipelines must effectively harness AI and automate risk assessment, package management, vulnerability management, and remediation.
2121

content/en/blog/contributors/SBOMS_in_SDLC.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ author: Ankur Kumar
1010

1111
# Introduction
1212

13-
The software supply chain is a model for producing quality products with an integrated lifecycle of upstream and downstream dependencies. An SBOM is a key component of the software supply chain. SBOM adoption has increased exponentially considering legal, compliance, and security considerations. This article briefly introduces SBOM and describes its usage in the Software Delivery Life Cycle (SDLC).
13+
The software supply chain is a model for producing quality products with an integrated lifecycle of upstream and downstream dependencies. A Software Bill of Material (SBOM) is a key component of the software supply chain. SBOM adoption has increased exponentially considering legal, compliance, and security considerations. This article briefly introduces SBOM and describes its usage in the Software Delivery Life Cycle (SDLC).
1414

1515

1616

0 commit comments

Comments
 (0)