Perforce Software launched a breakthrough in agentic AI testing with the ability to turn plain language inputs into resilient, execution-ready test actions.
Developers often embody the roles of artists, architects, and inventors. Through their expertise, companies have transformed from emerging startups into industry-leading unicorns. But while developers may have an eye for innovation, they are not, nor should they be, security experts or open-source specialists — despite expectations from security teams.
This disconnect has led to an environment where confidence in delivering zero-vulnerability software far outpaces actual preparedness. A new survey from Lineaje revealed that nearly a third of security professionals (32%) believe they can deliver zero-vulnerability software despite the myriad threats and increasing compliance regulations. While 68% are more realistic, the initial number highlights some critical blind spots in organizations' software supply chain defenses.
Here are the other top findings from the research:
Mounting SBOM Regulations Met with Incomplete Implementation
The overwhelming majority (90%) of today's software architectures are made up of open-source code. Unfortunately, 95% of all software weaknesses are directly attributable to open-source. The survey found that 34% of security professionals have reported difficulty in identifying and tracking open-source dependencies. The result is an increase in software supply chain attacks like the recent easyjson open-source vulnerability.
In an effort to curb these breaches, there has been an increase in software bill of materials (SBOM) regulations, including the US Office of Management and Budget (OMB) Memo M-22-18, Executive Order 14028, and the EU Cyber Resilience Act. However, the research found that 48% of security professionals are falling behind the legislation, and 47% have not started SBOM integration or are still in the evaluating tools and practices stage.
Security Teams Leaving "Small" Vulnerabilities Unaddressed
According to the survey, 38% of security professionals are trying to stay ahead of threat actors by prioritizing the most vulnerable areas of applications. At first, this seems positive. However, it leaves the supposedly less vulnerable areas in the software supply chain open to attack. With AI advancements, all vulnerabilities have the potential to cause catastrophic damage. Without full visibility into all software supply chain dependencies, organizations are likely underestimating risk.
Nearly a third (29%) of teams are still lacking the tools and processes needed to analyze SBOMs for vulnerabilities. Organizations face delayed threat times, widening the window of opportunity for attackers to exploit them, without the ability to correlate SBOM data with known weaknesses.
AI Remediation is Rising, But So Are AI-Driven Threats
Almost all (88%) of security professionals surveyed believed AI has the potential to significantly enhance software supply chain visibility. Over the past few years, there's been an uptick in organizations' desire to use AI for auto-remediation of code. While the readiness to adopt AI to secure code is a good thing, it's only half of the AI equation.
AI also introduces considerable risks. When asked what the most pressing issues are with AI, respondents said data security and privacy risks (35%) and AI code generation and vibe coding risks (26%). With AI code generation and vibe coding significantly increasing the software supply chain attack surface, this makes a lot of sense. While AI-powered auto-remediation is a great tool in combating this increased risk, it is limited to vulnerabilities for which fixes are available. 70% of respondents admitted that when a fix isn't available, they either don't have or are not sure if there is a remediation plan in place.
Developers can't carry the burden of security by default, and AI, while promising, is no silver bullet. The survey proves the necessity for organizations to bridge the gap between ambition and execution by investing in full-lifecycle visibility technologies, enforcing SBOM best practices, and preparing for the risks that are coming with AI. Without this balanced approach, the aspirations for zero-vulnerability software will remain more fiction than reality.
Industry News
OutSystems announced the Early Access Program for OutSystems Agent Workbench.
Harness Infrastructure as Code Management (IaCM) added major new features focused on reusability and scalability: Module Registry and Workspace Templates.
F5 announced new tools to reduce the immense complexity cross-functional operations (XOps) teams face in managing hybrid, multicloud, and AI-driven application environments.
BlueOptima has entered into an agreement to acquire the DevOps solutions business from Cirata, an AIM-listed provider of data and analytics migration solutions.
Google Cloud announced three major advancements for developers using Firebase.
Legit Security announced a major new feature that furthers its commitment to better serve the AI-first developer community: Legit MCP (Model Context Protocol) Server.
Pentera introduced a capability to uncover and validate risk exposure from data in Git repositories.
Domino Data Lab announced the launch of its Vibe Modeling offering.
MetTel announced a strategic partnership with Check Point Software Technologies to deliver an advanced mobile threat defense solution for enterprise customers.
Docker announced major new capabilities that make it easier for developers to build, run, and scale intelligent, agentic applications.
Azul announced a strategic partnership to deliver near-zero Common Vulnerabilities and Exposures (CVEs) third-party container images backed by Azul’s Java support.
Mirantis is extending support for Swarm for another five years.
Yellow Tail Tech, the training provider known for empowering adults with no IT background to launch successful technology careers, announced the rollout of two advanced programs: the Ansible Automation Certification Prep Track and the DevOps on AWS Track.
Red Hat announced Red Hat Enterprise Linux for Business Developers to simplify access to Red Hat's enterprise Linux platform for business-focused development and testing scenarios.