[{"data":1,"prerenderedAt":523},["ShallowReactive",2],{"/en-us/the-source/security/ai-agents-are-reshaping-software-what-cisos-need-to-know":3,"footer-en-us":51,"the-source-banner-en-us":385,"the-source-navigation-en-us":391,"article-site-categories-en-us":414,"the-source-newsletter-en-us":416,"ai-agents-are-reshaping-software-what-cisos-need-to-know-article-hero-category-en-us":423,"ai-agents-are-reshaping-software-what-cisos-need-to-know-the-source-source-cta-en-us":449,"ai-agents-are-reshaping-software-what-cisos-need-to-know-article-hero-author-en-us":459,"ai-agents-are-reshaping-software-what-cisos-need-to-know-category-en-us":483,"ai-agents-are-reshaping-software-what-cisos-need-to-know-the-source-resources-en-us":496},{"id":4,"title":5,"body":6,"category":7,"config":8,"content":14,"description":6,"extension":41,"meta":42,"navigation":11,"path":43,"seo":44,"slug":47,"stem":48,"type":49,"__hash__":50},"theSource/en-us/the-source/security/ai-agents-are-reshaping-software-what-cisos-need-to-know.yml","Ai Agents Are Reshaping Software What Cisos Need To Know",null,"security",{"layout":9,"template":10,"featured":11,"author":12,"sourceCTA":13},"the-source","TheSourceArticle",true,"josh-lemos","software-innovation-report-2025",{"title":15,"description":16,"date":17,"timeToRead":18,"heroImage":19,"keyTakeaways":20,"articleBody":24,"faq":25},"AI agents are reshaping software: What CISOs need to know","Most executives believe AI agents will dominate software development by 2028. Here’s what security leaders must do to prepare today.","2025-10-21","5 min read","https://res.cloudinary.com/about-gitlab-com/image/upload/v1761059283/rolzub9bctnigdo573kb.png",[21,22,23],"Nearly 9 in 10 executives expect AI agents to become standard in software development within three years, creating urgent security challenges.","Organizations lack proper AI governance, with nearly half missing regulatory compliance and internal policies for artificial intelligence systems.","Security leaders can prepare by implementing identity policies, monitoring frameworks, and upskilling teams for the AI-driven software future.","New research from GitLab shows that 89% of C-level executives surveyed expect AI agents will become the standard approach for building software within three years. This transformation brings significant security implications, as 85% of these leaders recognize that AI agents will introduce never-before-seen security challenges.\n\nThe findings highlight a critical dilemma facing CISOs and security professionals: They can’t afford to pause AI adoption, but they must address the emerging risks it creates. With 91% of executives surveyed planning to boost their AI investments in software development over the next 18 months, each new AI breakthrough intensifies these security concerns.\n\n## AI governance gaps create adoption barriers\nSecurity leaders clearly understand the primary risks associated with [AI agents](https://about.gitlab.com/the-source/ai/agentic-ai-unlocking-developer-potential-at-scale/). Survey participants identified cybersecurity threats (52%), data privacy and security concerns (51%), and governance challenges (45%) as their top worries. These interconnected risks continue to evolve as the technology advances.\n\nOrganizations need robust AI governance frameworks to adapt their security approaches in response to emerging threats. However, this is easier said than done, since AI impacts multiple technology areas, from data governance to identity and access management. GitLab’s research indicates that organizations are falling behind in governance frameworks as many surveyed leaders said their organizations haven’t implemented regulatory-aligned governance (47%) or internal policies (48%) around AI.\n\nThis governance gap is the result of legitimate industry-wide challenges that make it difficult for leaders to focus their efforts effectively. AI agents behave unpredictably due to their non-deterministic nature, which disrupts traditional security boundaries. Additionally, new universal protocols such as [Model Context Protocol](https://about.gitlab.com/topics/ai/model-context-protocol/) and Agent2Agent, which simplify data access and improve how agents work together, increase security complexity because they expand the attack surface and create new pathways for unauthorized access across interconnected systems.\n\nHowever, these challenges shouldn’t stop security leaders from prioritizing AI governance. Organizations waiting for comprehensive AI best practices will find themselves constantly behind the curve, and those that avoid AI altogether will still be exposed to AI risks through vendor relationships and unauthorized AI use within their environments.\n\n## Practical steps CISOs can take for AI agent readiness\nSecurity leaders should start by establishing AI observability systems that can track, audit, and attribute agent behaviors across all environments. Here are a few steps CISOs can take today to reduce AI risk and improve governance.\n\n### Establish identity policies that create accountability for agent actions\nAs AI systems proliferate, managing non-human identities will be just as critical as controlling human user access. [Composite identities](https://about.gitlab.com/blog/improve-ai-security-in-gitlab-with-composite-identities/) offer one solution by connecting AI agent credentials with the human users who direct them. This approach helps organizations to authenticate and authorize agents while maintaining clear accountability for their actions.\n\n### Implement comprehensive monitoring frameworks\nDevelopment, operations, and security teams require visibility into AI agent activities across various workflows, processes, and systems. Monitoring cannot stop at code repositories. Teams must track agent behavior in staging environments, production systems, connected databases, and all applications the agents can access.\n\n### Develop team AI capabilities\nAI literacy is now a must-have for security teams. In GitLab’s survey, 43% of respondents acknowledged a growing AI skills gap, and this is likely to expand unless technical leaders invest in team education. Training should cover model behavior, prompt engineering, and critical evaluation of model inputs and outputs.\n\nKnowing where models excel and where they underperform helps teams avoid unnecessary security risks and technical debt. For instance, models trained on anti-patterns effectively detect those specific issues but struggle with unfamiliar logic bugs. AI models that perform poorly in areas where security engineers or developers lack experience will leave security gaps that human professionals won’t be able to identify. One solution that can help is to ensure teams have sufficient expertise to validate AI outputs and catch potential errors.\n\nCISOs should consider dedicating a portion of learning and development budgets to continuous technical education. This [builds internal AI security expertise](https://about.gitlab.com/the-source/ai/from-vibe-coding-to-agentic-ai-a-roadmap-for-technical-leaders/), creating AI champions who can train colleagues and reinforce good practices.\n\n## Security benefits outweigh AI adoption risks\nProperly monitored and implemented AI actually enhances security outcomes. In fact, 45% of survey respondents ranked security as the top area where AI can add value for software development. When used to accelerate rather than replace human expertise, AI can democratize security knowledge across development teams by automating routine security tasks, providing intelligent coding suggestions, and offering security context within developer workflows.\n\nFor example, AI can explain vulnerabilities, enabling developers to resolve issues quickly without waiting for security team guidance. These capabilities help improve security outcomes, reduce risk exposure, and increase understanding between development and security teams.\n\nSuccess belongs to organizations that embrace AI — but do so carefully. Even imperfect foundational controls help teams adapt as conditions change. If the executives surveyed are right, the three-year clock is already ticking. Leaders who guide their teams toward the right AI use cases won't just minimize risk; they will gain a competitive advantage. After all, the security of your software is a core component of its quality.",[26,29,32,35,38],{"header":27,"content":28},"What percentage of executives expect AI agents to become standard practice?","89% of C-level executives surveyed expect AI agents will become the standard approach for building software within three years. Additionally, 91% of executives plan to boost their AI investments in software development over the next 18 months. However, 85% recognize that AI agents will introduce never-before-seen security challenges.",{"header":30,"content":31},"What are the top security concerns executives have about AI agents?","The primary risks identified by survey participants are cybersecurity threats at 52%, data privacy and security concerns at 51%, and governance challenges at 45%. These interconnected risks continue to evolve as AI technology advances, creating complex security implications for organizations.",{"header":33,"content":34},"How many organizations currently lack proper AI governance frameworks?","Nearly half of surveyed leaders report governance gaps in their organizations. 47% said their organizations haven't implemented regulatory-aligned governance around AI, and 48% lack internal policies. This governance gap creates adoption barriers despite the urgent need for AI integration in business operations.",{"header":36,"content":37},"What practical steps can CISOs take to prepare for AI agent security?","CISOs should establish identity policies that create accountability for agent actions through composite identities connecting AI credentials with human users. Implement comprehensive monitoring frameworks tracking agent behavior across all environments including staging, production, and connected databases. Develop team AI capabilities including prompt engineering and model evaluation skills.",{"header":39,"content":40},"How do security benefits compare to AI adoption risks for organizations?","Security benefits can outweigh adoption risks when AI is properly monitored and implemented. 45% of survey respondents ranked security as the top area where AI can add value for software development. AI can democratize security knowledge, automate routine tasks, provide intelligent coding suggestions, and explain vulnerabilities to help developers resolve issues quickly.","yml",{},"/en-us/the-source/security/ai-agents-are-reshaping-software-what-cisos-need-to-know",{"config":45,"title":15,"description":16},{"noIndex":46},false,"ai-agents-are-reshaping-software-what-cisos-need-to-know","en-us/the-source/security/ai-agents-are-reshaping-software-what-cisos-need-to-know","article","GWKfSmPXw84SGvDRnBgunUqPToAkDw9Nx9BuwSK-lxs",{"data":52},{"text":53,"source":54,"edit":60,"contribute":65,"config":70,"items":75,"minimal":374},"Git is a trademark of Software Freedom Conservancy and our use of 'GitLab' is under license",{"text":55,"config":56},"View page source",{"href":57,"dataGaName":58,"dataGaLocation":59},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/","page source","footer",{"text":61,"config":62},"Edit this page",{"href":63,"dataGaName":64,"dataGaLocation":59},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/content/","web ide",{"text":66,"config":67},"Please contribute",{"href":68,"dataGaName":69,"dataGaLocation":59},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/CONTRIBUTING.md/","please contribute",{"twitter":71,"facebook":72,"youtube":73,"linkedin":74},"https://twitter.com/gitlab","https://www.facebook.com/gitlab","https://www.youtube.com/channel/UCnMGQ8QHMAnVIsI3xJrihhg","https://www.linkedin.com/company/gitlab-com",[76,133,190,249,312],{"title":77,"links":78,"subMenu":94},"Pricing",[79,84,89],{"text":80,"config":81},"View plans",{"href":82,"dataGaName":83,"dataGaLocation":59},"/pricing/","view plans",{"text":85,"config":86},"Why Premium?",{"href":87,"dataGaName":88,"dataGaLocation":59},"/pricing/premium/","why premium",{"text":90,"config":91},"Why Ultimate?",{"href":92,"dataGaName":93,"dataGaLocation":59},"/pricing/ultimate/","why ultimate",[95],{"title":96,"links":97},"Contact Us",[98,103,108,113,118,123,128],{"text":99,"config":100},"Contact sales",{"href":101,"dataGaName":102,"dataGaLocation":59},"/sales/","sales",{"text":104,"config":105},"Support portal",{"href":106,"dataGaName":107,"dataGaLocation":59},"https://support.gitlab.com","support portal",{"text":109,"config":110},"Customer portal",{"href":111,"dataGaName":112,"dataGaLocation":59},"https://customers.gitlab.com/customers/sign_in/","customer portal",{"text":114,"config":115},"Status",{"href":116,"dataGaName":117,"dataGaLocation":59},"https://status.gitlab.com/","status",{"text":119,"config":120},"Terms of use",{"href":121,"dataGaName":122,"dataGaLocation":59},"/terms/","terms of use",{"text":124,"config":125},"Privacy statement",{"href":126,"dataGaName":127,"dataGaLocation":59},"/privacy/","privacy statement",{"text":129,"config":130},"Cookie preferences",{"dataGaName":131,"dataGaLocation":59,"id":132,"isOneTrustButton":11},"cookie preferences","ot-sdk-btn",{"title":134,"links":135,"subMenu":146},"Product",[136,141],{"text":137,"config":138},"DevSecOps platform",{"href":139,"dataGaName":140,"dataGaLocation":59},"/platform/","devsecops platform",{"text":142,"config":143},"AI-Assisted Development",{"href":144,"dataGaName":145,"dataGaLocation":59},"/gitlab-duo/","ai-assisted development",[147],{"title":148,"links":149},"Topics",[150,155,160,165,170,175,180,185],{"text":151,"config":152},"CICD",{"href":153,"dataGaName":154,"dataGaLocation":59},"/topics/ci-cd/","cicd",{"text":156,"config":157},"GitOps",{"href":158,"dataGaName":159,"dataGaLocation":59},"/topics/gitops/","gitops",{"text":161,"config":162},"DevOps",{"href":163,"dataGaName":164,"dataGaLocation":59},"/topics/devops/","devops",{"text":166,"config":167},"Version Control",{"href":168,"dataGaName":169,"dataGaLocation":59},"/topics/version-control/","version control",{"text":171,"config":172},"DevSecOps",{"href":173,"dataGaName":174,"dataGaLocation":59},"/topics/devsecops/","devsecops",{"text":176,"config":177},"Cloud Native",{"href":178,"dataGaName":179,"dataGaLocation":59},"/topics/cloud-native/","cloud native",{"text":181,"config":182},"AI for Coding",{"href":183,"dataGaName":184,"dataGaLocation":59},"/topics/devops/ai-for-coding/","ai for coding",{"text":186,"config":187},"Agentic AI",{"href":188,"dataGaName":189,"dataGaLocation":59},"/topics/agentic-ai/","agentic ai",{"title":191,"links":192},"Solutions",[193,197,202,207,212,216,221,224,229,234,239,244],{"text":194,"config":195},"Application Security Testing",{"href":196,"dataGaName":194,"dataGaLocation":59},"/solutions/application-security-testing/",{"text":198,"config":199},"Automated software delivery",{"href":200,"dataGaName":201,"dataGaLocation":59},"/solutions/delivery-automation/","automated software delivery",{"text":203,"config":204},"Agile development",{"href":205,"dataGaName":206,"dataGaLocation":59},"/solutions/agile-delivery/","agile delivery",{"text":208,"config":209},"SCM",{"href":210,"dataGaName":211,"dataGaLocation":59},"/solutions/source-code-management/","source code management",{"text":151,"config":213},{"href":214,"dataGaName":215,"dataGaLocation":59},"/solutions/continuous-integration/","continuous integration & delivery",{"text":217,"config":218},"Value stream management",{"href":219,"dataGaName":220,"dataGaLocation":59},"/solutions/value-stream-management/","value stream management",{"text":156,"config":222},{"href":223,"dataGaName":159,"dataGaLocation":59},"/solutions/gitops/",{"text":225,"config":226},"Enterprise",{"href":227,"dataGaName":228,"dataGaLocation":59},"/enterprise/","enterprise",{"text":230,"config":231},"Small business",{"href":232,"dataGaName":233,"dataGaLocation":59},"/small-business/","small business",{"text":235,"config":236},"Public sector",{"href":237,"dataGaName":238,"dataGaLocation":59},"/solutions/public-sector/","public sector",{"text":240,"config":241},"Education",{"href":242,"dataGaName":243,"dataGaLocation":59},"/solutions/education/","education",{"text":245,"config":246},"Financial services",{"href":247,"dataGaName":248,"dataGaLocation":59},"/solutions/finance/","financial services",{"title":250,"links":251},"Resources",[252,257,262,267,272,277,282,287,292,297,302,307],{"text":253,"config":254},"Install",{"href":255,"dataGaName":256,"dataGaLocation":59},"/install/","install",{"text":258,"config":259},"Quick start guides",{"href":260,"dataGaName":261,"dataGaLocation":59},"/get-started/","quick setup checklists",{"text":263,"config":264},"Learn",{"href":265,"dataGaName":266,"dataGaLocation":59},"https://university.gitlab.com/","learn",{"text":268,"config":269},"Product documentation",{"href":270,"dataGaName":271,"dataGaLocation":59},"https://docs.gitlab.com/","docs",{"text":273,"config":274},"Blog",{"href":275,"dataGaName":276,"dataGaLocation":59},"/blog/","blog",{"text":278,"config":279},"Customer success stories",{"href":280,"dataGaName":281,"dataGaLocation":59},"/customers/","customer success stories",{"text":283,"config":284},"Remote",{"href":285,"dataGaName":286,"dataGaLocation":59},"https://handbook.gitlab.com/handbook/company/culture/all-remote/","remote",{"text":288,"config":289},"GitLab Services",{"href":290,"dataGaName":291,"dataGaLocation":59},"/services/","services",{"text":293,"config":294},"Community",{"href":295,"dataGaName":296,"dataGaLocation":59},"/community/","community",{"text":298,"config":299},"Forum",{"href":300,"dataGaName":301,"dataGaLocation":59},"https://forum.gitlab.com/","forum",{"text":303,"config":304},"Events",{"href":305,"dataGaName":306,"dataGaLocation":59},"/events/","events",{"text":308,"config":309},"Partners",{"href":310,"dataGaName":311,"dataGaLocation":59},"/partners/","partners",{"title":313,"links":314},"Company",[315,320,325,330,335,340,345,349,354,359,364,369],{"text":316,"config":317},"About",{"href":318,"dataGaName":319,"dataGaLocation":59},"/company/","company",{"text":321,"config":322},"Jobs",{"href":323,"dataGaName":324,"dataGaLocation":59},"/jobs/","jobs",{"text":326,"config":327},"Leadership",{"href":328,"dataGaName":329,"dataGaLocation":59},"/company/team/e-group/","leadership",{"text":331,"config":332},"Team",{"href":333,"dataGaName":334,"dataGaLocation":59},"/company/team/","team",{"text":336,"config":337},"Handbook",{"href":338,"dataGaName":339,"dataGaLocation":59},"https://handbook.gitlab.com/","handbook",{"text":341,"config":342},"Investor relations",{"href":343,"dataGaName":344,"dataGaLocation":59},"https://ir.gitlab.com/","investor relations",{"text":346,"config":347},"Sustainability",{"href":348,"dataGaName":346,"dataGaLocation":59},"/sustainability/",{"text":350,"config":351},"Diversity, inclusion and belonging (DIB)",{"href":352,"dataGaName":353,"dataGaLocation":59},"/diversity-inclusion-belonging/","Diversity, inclusion and belonging",{"text":355,"config":356},"Trust Center",{"href":357,"dataGaName":358,"dataGaLocation":59},"/security/","trust center",{"text":360,"config":361},"Newsletter",{"href":362,"dataGaName":363,"dataGaLocation":59},"/company/contact/#contact-forms","newsletter",{"text":365,"config":366},"Press",{"href":367,"dataGaName":368,"dataGaLocation":59},"/press/","press",{"text":370,"config":371},"Modern Slavery Transparency Statement",{"href":372,"dataGaName":373,"dataGaLocation":59},"https://handbook.gitlab.com/handbook/legal/modern-slavery-act-transparency-statement/","modern slavery transparency statement",{"items":375},[376,379,382],{"text":377,"config":378},"Terms",{"href":121,"dataGaName":122,"dataGaLocation":59},{"text":380,"config":381},"Cookies",{"dataGaName":131,"dataGaLocation":59,"id":132,"isOneTrustButton":11},{"text":383,"config":384},"Privacy",{"href":126,"dataGaName":127,"dataGaLocation":59},{"visibility":11,"title":386,"button":387},"The Intelligent Software Development Era: How AI is reshaping DevSecOps teams",{"config":388,"text":390},{"href":389},"/developer-survey/","Get the research report",{"logo":392,"subscribeLink":397,"navItems":401},{"altText":393,"config":394},"the source logo",{"src":395,"href":396},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1750191004/t7wz1klfb2kxkezksv9t.svg","/the-source/",{"text":398,"config":399},"Subscribe",{"href":400},"#subscribe",[402,406,410],{"text":403,"config":404},"Artificial Intelligence",{"href":405},"/the-source/ai/",{"text":407,"config":408},"Security & Compliance",{"href":409},"/the-source/security/",{"text":411,"config":412},"Platform & Infrastructure",{"href":413},"/the-source/platform/",{"categoryNames":415},{"ai":403,"platform":411,"security":407},{"title":417,"description":418,"submitMessage":419,"formData":420},"The Source Newsletter","Stay updated with insights for the future of software development.","You have successfully signed up for The Source’s newsletter.",{"config":421},{"formId":422,"formName":363,"hideRequiredLabel":11},1077,{"id":424,"title":425,"body":6,"category":6,"config":426,"content":427,"description":6,"extension":41,"meta":443,"navigation":11,"path":444,"seo":445,"slug":7,"stem":446,"testContent":6,"type":447,"__hash__":448},"pages/en-us/the-source/security/index.yml","",{"layout":9},[428,435],{"componentName":429,"type":429,"componentContent":430},"TheSourceCategoryHero",{"title":407,"description":431,"image":432},"Get up to speed on how organizations can ensure they're staying on top of evolving security threats and compliance requirements.",{"config":433},{"src":434},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463273/aplkxrvwpii26xao5yhi.png",{"componentName":436,"type":436,"componentContent":437},"TheSourceCategoryMainSection",{"config":438},{"sourceCTAs":439},[440,441,442],"source-lp-guide-to-dynamic-sboms","source-lp-devsecops-the-key-to-modern-security-resilience","application-security-in-the-digital-age",{},"/en-us/the-source/security",{"title":407,"description":431,"ogImage":434},"en-us/the-source/security/index","category","Yz-XSZ2w3Zg4r2_4aWlzq2kmfduukECmMNfXD6Ha26w",{"config":450,"title":451,"description":452,"link":453},{"slug":13},"Research Report: The Economics of Software Innovation","Learn what global C-suite executives are saying about AI-powered business growth, agentic AI adoption, upskilling, and how to demonstrate the impact of software innovation.",{"text":454,"config":455},"Read the report",{"href":456,"dataGaName":457,"dataGaLocation":458},"/software-innovation-report/","The Economics of Software Innovation","thesource",{"id":460,"title":461,"body":6,"category":6,"config":462,"content":463,"description":6,"extension":41,"meta":477,"navigation":11,"path":478,"seo":479,"slug":12,"stem":480,"testContent":6,"type":481,"__hash__":482},"theSourceAuthors/en-us/the-source/authors/josh-lemos.yml","Josh Lemos",{"layout":9},[464,475],{"componentName":465,"type":465,"componentContent":466},"TheSourceAuthorHero",{"config":467,"name":461,"role":470,"bio":471,"headshot":472},{"gitlabHandle":468,"linkedInProfileUrl":469},"joshlemos","https://www.linkedin.com/in/joshlemos/","Chief Information Security Officer","Josh Lemos is the Chief Information Security Officer at GitLab Inc., where he brings 20 years of experience leading information security teams to his role. He is responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected, fortifying the Gitlab DevSecOps platform and ensuring the highest level of security for customers.",{"altText":461,"config":473},{"src":474},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463405/f4rqtiecakrekvxfhqar.jpg",{"componentName":476,"type":476},"TheSourceArticlesList",{},"/en-us/the-source/authors/josh-lemos",{"title":461},"en-us/the-source/authors/josh-lemos","author","Kzh9L_9H8IeYxDNNFgPiZ3BBOSdgaHIyKFkhllwdLjI",{"id":424,"title":425,"body":6,"category":6,"config":484,"content":485,"description":6,"extension":41,"meta":494,"navigation":11,"path":444,"seo":495,"slug":7,"stem":446,"testContent":6,"type":447,"__hash__":448},{"layout":9},[486,490],{"componentName":429,"type":429,"componentContent":487},{"title":407,"description":431,"image":488},{"config":489},{"src":434},{"componentName":436,"type":436,"componentContent":491},{"config":492},{"sourceCTAs":493},[440,441,442],{},{"title":407,"description":431,"ogImage":434},[497,505,514],{"config":498,"title":499,"description":500,"link":501},{"slug":442},"Application security in the digital age","Read our survey findings from more than 5,000 DevSecOps professionals worldwide for insights on how organizations are grappling with increasing attack surfaces and changing attitudes towards security and AI.",{"text":454,"config":502},{"href":503,"dataGaName":504,"dataGaLocation":458},"/developer-survey/2024/security-compliance/","Application Security in the Digital Age",{"config":506,"title":507,"description":508,"link":509},{"slug":441},"DevSecOps: The key to modern security resilience","Learn how embedding security in development can slash incident response time by 720x and save millions in security costs annually.",{"text":510,"config":511},"Download the guide",{"href":512,"dataGaName":513,"dataGaLocation":458},"/the-source/security/devsecops-the-key-to-modern-security-resilience/","DevSecOps the key to modern security resilience",{"config":515,"title":516,"description":517,"link":518},{"slug":440},"Guide to dynamic SBOMs: An integral element of modern software development","Learn how to gain visibility into previously unidentified organizational risks with a software bill of materials (SBOM).",{"text":519,"config":520},"Read the guide",{"href":521,"dataGaName":522,"dataGaLocation":458},"/the-source/security/guide-to-dynamic-sboms/","Guide to Dynamic SBOMs",1772652091702]