Vendor Forum

June 12, 2025
Paul Barbosa
Check Point Software Technologies

Once, the castle-and-moat model of traditional firewalls offered a sense of safety, but the rules of network security have been rewritten. Static, perimeter-focused defenses are no longer sufficient in our cloud-first reality. Let's be clear: firewalls aren't going away; they're undergoing a metamorphosis to be more dynamic and integrated with application-level security, hand-in-hand with zero trust ...

June 11, 2025
Nick Mistry
Lineaje

A new survey from Lineaje revealed that nearly a third of security professionals (32%) believe they can deliver zero-vulnerability software despite the myriad threats and increasing compliance regulations. While 68% are more realistic, the initial number highlights some critical blind spots in organizations’ software supply chain defenses. Here are the other top findings from the research ...

June 10, 2025
Jason Beres
Infragistics

AI has emerged as the newest "must-have" technology for companies, resulting in rising speculation into whether it will eventually replace low-code/no-code tools altogether. However, according to the 2025 App Development Trends Report from App Builder, that is not the case, with the report revealing that 76% of tech leaders are looking to AI to make their existing low-code/no-code tools more efficient instead of replacing them ...

June 04, 2025
Michael Olechna
Guardsquare

DevOps teams are readily embracing modern tools that utilize large language models (LLMs), generative AI (GenAI), and the very buzzy agentic AI to accelerate their continuous integration/continuous delivery (CI/CD) pipelines ... But AI's tremendous potential business value is currently outshining some very real risks to mobile applications and the broader software supply chain ...

June 03, 2025
Rob Mason
Applause

As the European Accessibility Act (EAA) deadline draws closer, my organization, Applause, just released the results of our fifth annual State of Digital Quality in Accessibility survey ... Let's start with the good news. Digital accessibility awareness has steadily grown over the past four years, with the majority of organizations considering it a priority ...

June 02, 2025
Emeka Nwosu
VTEX

For many B2B and B2C enterprise brands, technology isn't a core strength. Relying on overly complex architectures (like those that follow a pure MACH doctrine) has been flagged by industry leaders as a source of operational slowdown, creating bottlenecks that limit agility in volatile market conditions ...

May 29, 2025
Itay Nussbaum
Apiiro

Over the past two years, code assistants based on generative AI have transformed software coding, accelerating the generation of code on an unprecedented level. Developers are deploying more code than ever, but at a cost: exponential growth in security vulnerabilities. New research points to a 3X increase in repositories containing Personally Identifiable Information (PII) and payment data, a 10X increase in APIs without authorization and input validation, and more sensitive API endpoints exposed, all threats proliferated by AI-generated code. Though AI code assistants boost productivity, they possess no understanding of organizational risk, compliance policies, or security best practices, leaving companies more exposed ...

May 28, 2025
Matias Madou
Secure Code Warrior

CISA's Product Security Bad Practices paper is one that every company should review as it details the "exceptionally risky software development activities" that are all too common in the industry ... While CISA's efforts can help companies navigate the "need for speed" in a fast-moving DevOps environment, IT and security leaders across the private sector must do their part to prepare their companies for the necessary changes ...

May 22, 2025
Maxim Melamedov
Zesty

Kubernetes was not initially designed with AI's vast resource variability in mind, and the rapid rise of AI has exposed Kubernetes limitations, particularly when it comes to cost and resource efficiency. Indeed, AI workloads differ from traditional applications in that they require a staggering amount and variety of compute resources, and their consumption is far less consistent than traditional workloads ... Considering the speed of AI innovation, teams cannot afford to be bogged down by these constant infrastructure concerns. A solution is needed ...

May 15, 2025
John Campbell
Security Journey

Developers are leveraging AI to accelerate the software development lifecycle, enabling them to automate repetitive coding tasks and generate substantial amounts of code in a fraction of the usual time. However, despite the numerous production advantages that AI has brought to organizations, it has simultaneously made it easier for less skilled hackers to infiltrate company systems with AI malicious code ...

May 13, 2025
Dwayne McDaniel
GitGuardian

You might not hear about Artifactory tokens in mainstream security discussions, but here's a troubling reality: these tokens are corporate security's hidden Achilles' heel. Unlike many leaked credentials that turn out to be harmless personal access tokens or defunct keys, Artifactory tokens almost always lead directly to critical corporate assets ...

May 08, 2025
Brian McHenry
Check Point Software

Security tools left running with weak configurations are a daily occurrence, as common as your morning brew. Breaches don't always start with flashy zero-days or clever phishing campaigns. They often begin with tools you trust; weak access controls, outdated configurations, and carelessness in setup make them prime targets for malicious actors ...

May 06, 2025
David Brooks
Copado

The concepts of "Shift Left" and "Shift Right" are well established in the DevOps world. But with the rise of AI Agents, a new paradigm is emerging: Shift Up. Intelligent agents are increasingly managing the tedious details of Application Lifecycle Management (ALM), from generating code and tests to automating deployments ...

May 05, 2025
Steve Winterfeld
Akamai

Proof is in the data from Akamai's new research State of Apps and API Security 2025: How AI Is Shifting the Digital Terrain. Overall, we see traditional web attacks targeting web applications and APIs continue to rise, as shown by a 65% increase between Q1 2023 and Q4 2024. This shows that the capabilities that are being developed are under increasing levels of attack ...

April 30, 2025
Pawel Hytry
Spacelift

Many infrastructure technology teams believe they have mastered automation, but the data tells a different story. According to a survey of 413 infrastructure decision-makers commissioned by Spacelift, 45% of organizations say they've achieved high levels of automation — yet only 14% demonstrate the patterns and practices of true infrastructure automation excellence ...

Pages

Subscribe to Vendor Forum