The dominance of AI in the technology landscape means there are new security challenges. That’s why we’ve once again included threat modeling [Techniques] in Adopt, which last appeared in October 2022.
Also in Adopt is Software Bill of Materials [Techniques]. Incidentally, it too last appeared on the Radar in October 2022 (in Trial), but we think the ecosystem has matured in recent years. There are many options out there on the market, but in an environment of increasing complexity and risk, it’s something worth investing time and money in.
Another software supply chain tool featured on the Radar is Chainloop [Platforms/Assess], an open-source supply chain security platform that helps security teams enforce compliance while allowing development teams to seamlessly integrate security compliance into CI/CD pipelines.
More security blips worth exploring…
- Plerion [Tools/Trial], an AWS-focused cloud security platform that integrates with hosting providers to uncover risks, misconfigurations and vulnerabilities across your cloud infrastructure, servers and applications.
- Just-in-time privileged access management [Techniques/Trial], where system access is granted only when needed and revoked immediately after to minimize security risks.