diff --git a/content/en/_index.md b/content/en/_index.md index ef8389ae..db6dfe0c 100644 --- a/content/en/_index.md +++ b/content/en/_index.md @@ -34,7 +34,7 @@ Code-level vulnerabilities pose a significant risk in the intricate landscape of Many IT teams struggle to respond to threats due to the fragmented nature of decoupled, cloud-native architecture. [Sonatype’s 2024 Report](https://www.sonatype.com/en/press-releases/sonatypes-10th-annual-state-of-the-software-supply-chain-report) shows a 156% increase in open-source package vulnerabilities, exceeding 512k, with 80% of them unaddressed for over a year. Ortelius streamlines the remediation process by showing where impacted open-sources packages are running across the infrastructure for continuous package remediation. -The Ortelius Community, managed by the [Continuous Delivery Foundation](https://cd.foundation), maintains the latest version, with corporate support from [DeployHub](https://www.deployhub.com). +The Ortelius Community, managed by the [Continuous Delivery Foundation](https://cd.foundation), maintains the latest version, with corporate support from DeployHub a [Continuous Vulnerability Management](https://www.deployhub.com) platform designed to expedite remediation patches. With Ortelius, you can easily answer the question, “where is Log4J running?” diff --git a/content/en/blog/contributors/DataNeededforDevSecOpsAI.md b/content/en/blog/contributors/DataNeededforDevSecOpsAI.md index e20ce99c..b77d46e8 100644 --- a/content/en/blog/contributors/DataNeededforDevSecOpsAI.md +++ b/content/en/blog/contributors/DataNeededforDevSecOpsAI.md @@ -15,7 +15,7 @@ author: Tracy Ragan As IT teams strive to bolster software supply chains against hidden vulnerabilities in open-source and third-party components, the demand for smart, streamlined, and automated DevSecOps pipelines is soaring. As monolithic applications evolve into intricate, decoupled parts, navigating the security landscape becomes increasingly complex. -To address these challenges, DevSecOps automation is stepping in to streamline software security tasks, sparing IT teams from drowning in manual work. The integration of 'applied' AI into DevOps heralds the dawn of next-generation DevSecOps pipelines, harnessing a wealth of data sources to refine processes, empower decision-making, and enhance overall efficiency. +To address these challenges, DevSecOps automation is stepping in to streamline software security tasks, sparing IT teams from drowning in manual work. The integration of 'applied' AI into DevOps heralds the dawn of next-generation DevSecOps pipelines, harnessing a wealth of data sources to refine processes, empower decision-making, and perform [continuous vulnerability management](https://www.deployhub.com/), critical to weathering the code-level cybersecurity storm. At Ortelius, our focus lies in gathering and centralizing data from various DevSecOps processes to forge the path towards the next era of DevSecOps pipelines. Modern pipelines must effectively harness AI and automate risk assessment, package management, vulnerability management, and remediation. diff --git a/content/en/blog/contributors/SBOMS_in_SDLC.md b/content/en/blog/contributors/SBOMS_in_SDLC.md index 7f3f40a0..e0dc1832 100644 --- a/content/en/blog/contributors/SBOMS_in_SDLC.md +++ b/content/en/blog/contributors/SBOMS_in_SDLC.md @@ -10,7 +10,7 @@ author: Ankur Kumar # Introduction -The software supply chain is a model for producing quality products with an integrated lifecycle of upstream and downstream dependencies. An SBOM is a key component of the software supply chain. SBOM adoption has increased exponentially considering legal, compliance, and security considerations. This article briefly introduces SBOM and describes its usage in the Software Delivery Life Cycle (SDLC). +The software supply chain is a model for producing quality products with an integrated lifecycle of upstream and downstream dependencies. A Software Bill of Material (SBOM) is a key component of the software supply chain. SBOM adoption has increased exponentially considering legal, compliance, and security considerations. This article briefly introduces SBOM and describes its usage in the Software Delivery Life Cycle (SDLC).