[{"data":1,"prerenderedAt":524},["ShallowReactive",2],{"/en-us/the-source/security/federal-cybersecurity-in-2025-looking-ahead":3,"footer-en-us":53,"the-source-banner-en-us":387,"the-source-navigation-en-us":393,"article-site-categories-en-us":416,"the-source-newsletter-en-us":418,"federal-cybersecurity-in-2025-looking-ahead-article-hero-category-en-us":425,"federal-cybersecurity-in-2025-looking-ahead-the-source-source-cta-en-us":451,"federal-cybersecurity-in-2025-looking-ahead-article-hero-author-en-us":460,"federal-cybersecurity-in-2025-looking-ahead-category-en-us":484,"federal-cybersecurity-in-2025-looking-ahead-the-source-resources-en-us":497},{"id":4,"title":5,"body":6,"category":7,"config":8,"content":14,"description":6,"extension":44,"meta":45,"navigation":46,"path":47,"seo":48,"slug":49,"stem":50,"type":51,"__hash__":52},"theSource/en-us/the-source/security/federal-cybersecurity-in-2025-looking-ahead.yml","Federal Cybersecurity In 2025 Looking Ahead",null,"security",{"layout":9,"template":10,"author":11,"featured":12,"sourceCTA":13},"the-source","TheSourceArticle","joel-krooswyk",false,"source-lp-how-to-build-a-resilient-software-development-practice",{"title":15,"date":16,"description":17,"timeToRead":18,"heroImage":19,"keyTakeaways":20,"articleBody":24,"faq":25},"Federal cybersecurity in 2025: Looking ahead","2025-02-26","Learn how AI will transform federal cybersecurity in 2025, from preventing cyber attacks to modernizing legacy code and automating compliance processes.","5 min read","https://res.cloudinary.com/about-gitlab-com/image/upload/v1751464594/brhph5gzlyth9ko13d5d.jpg",[21,22,23],"AI is becoming essential for federal cybersecurity, enabling agencies to detect and prevent cyber threats in minutes rather than days. However, human oversight remains crucial for guiding AI systems and validating their decisions.","Legacy code poses a major security risk, with 70% of vulnerabilities stemming from outdated systems. AI-powered tools will help agencies modernize their code bases and transition to more secure programming languages.","Software bills of materials (SBOMs) will become mandatory for federal contracts, giving agencies better visibility into their software supply chains and associated security risks. Vendors unable to provide SBOMs may lose opportunities.","In an era where a cyber attack happens [every 37 seconds](https://aag-it.com/the-latest-cyber-crime-statistics/), the federal government faces unprecedented challenges in protecting its IT systems and infrastructure. As nation-state actors and cybercriminals become more sophisticated, traditional security approaches are no longer sufficient.\n\nFederal agencies must remain secure while balancing new regulations, limited budgets, and the rise of artificial intelligence (AI). While not a silver bullet, AI technologies are proving to be powerful allies in the fight to secure federal systems. They help agencies do more with limited resources and quickly adapt to emerging threats. At the same time, the software development boom - driven in part by AI and open source - will require agencies to ensure they have more visibility into the license and security risks associated with their software.\n\nHere are four major changes we expect to see in federal cybersecurity during 2025:\n\n## AI will help stop cyber attacks before they happen\nIn the past, agencies would often react to cyber attacks after they happened. Now, AI is becoming essential for proactively preventing attacks. For example, the Department of Homeland Security uses AI to look through huge amounts of data to find possible threats.\n\nMore agencies will start using AI in 2025. [GitLab research](https://about.gitlab.com/the-source/platform/whats-next-in-devsecops-for-public-sector/) found that nearly half (47%) of public sector respondents were already using AI in the software development lifecycle in 2024; another 33% plan to start using AI by 2026. It makes sense that federal agencies would embrace AI tools that can spot dangerous activity much faster than humans can - sometimes in minutes instead of days. This is especially helpful for agencies that don't have many staff members.\n\nHowever, AI isn’t perfect on its own. People still need to check its work and ensure it’s making good decisions. Humans are also needed to guide AI and devise new ways to use it.\n\n## AI will help agencies modernize legacy code\nMany government systems use old programming languages that aren’t very secure. About 70% of security problems come from this legacy code. AI can help agencies [modernize legacy code to reduce the risk of security vulnerabilities](https://about.gitlab.com/the-source/security/why-legacy-code-is-a-security-risk-and-how-ai-can-help/).\n\nThe federal government has prioritized memory-safe programming languages to help avoid common software vulnerabilities. AI can automate tasks like code refactoring and analysis, helping organizations transition from memory-unsafe languages like C to more secure alternatives such as Rust or Go.\n\nAI tools can also look at old code and suggest ways to make it better and more secure. This helps agencies modernize their systems more quickly and protect against new threats.\n\n## AI will simplify compliance\nDevSecOps, compliance, and AI are on a collision course. Automation is the key to making compliance integral to software development and making it a more real-time activity than the traditional clipboard or checkbox approach.\n\nGovernment leaders are increasingly grappling with the complexities of compliance. AI simplifies this process by automating monitoring. It can warn agencies about problems immediately and help fix them, reducing the burden on compliance teams.\n\nCompliance checks will become a natural part of creating and updating software as technology improves. AI tools will proactively scan code for compliance violations and enforce security policies. While AI won’t completely automate this process in the near term, the shift to intelligent automation will help improve security and efficiency.\n\n## SBOMs will become a requirement, not just a best practice\nAI requires testing, guardrails, and management by humans and other tools, especially regarding security. A dynamic software bill of materials (SBOM) can give agencies full visibility into the license and security risks associated with their software, including any open source components.\n\nSBOMs help agencies understand exactly what’s in their software and what security risks might exist. The lists update automatically to show real-time information about potential problems.\n\n[GitLab research](https://about.gitlab.com/developer-survey/) has shown that use of open source software is on the rise: 67% of developers say that at least a quarter of the code bases they work on is from open source libraries. However, only 21% of respondents say they are currently using SBOMs to improve the security of the software development lifecycle.\n\nAs we move into 2025, SBOMs will become central to federal cybersecurity efforts. Defense agencies will lead the way, and civilian agencies will follow. The increased adoption of SBOMs will help defense and civilian agencies verify that nation-state actors have not made malicious contributions, promoting transparency and accountability within the federal government.\n\nMany agencies will likely require companies they work with to provide SBOMs - and potentially refuse to work with vendors that cannot comply.\n\n> [Read more about SBOMs and why they’ve become an integral part of modern software development](https://about.gitlab.com/blog/the-ultimate-guide-to-sboms/).\n\n## Looking ahead: From risk to resilience\nAs cyber threats continue to evolve, a strong security posture is essential. Agencies are finding creative ways to use AI to improve their security. By using AI to automate tasks, find problems quickly, and modernize old systems, agencies can better protect their critical information and systems. These investments in AI and security will help agencies stay ahead of future threats and safeguard critical assets.",[26,29,32,35,38,41],{"header":27,"content":28},"How can AI improve compliance in federal agencies?","AI simplifies compliance by automating monitoring and enforcement. AI-driven tools can proactively scan code for compliance violations, apply necessary fixes, and ensure adherence to security policies. This shift to automation will help agencies integrate compliance into their development processes more seamlessly, reducing manual oversight while improving security.",{"header":30,"content":31},"Why are federal agencies prioritizing SBOMs in 2025?","With increased reliance on open source software, federal agencies need better oversight of their software supply chains. SBOMs will become a standard requirement to improve transparency, enhance security, and meet federal compliance mandates. Defense agencies are expected to lead this effort, with civilian agencies following closely behind.",{"header":33,"content":34},"How will AI help prevent cyber attacks before they happen?","AI will enable agencies to transition from a reactive to a proactive cybersecurity approach. By analyzing large datasets, AI can identify and flag potential threats much faster than humans, reducing the time it takes to detect malicious activity. Federal agencies, including the Department of Homeland Security, are already leveraging AI to enhance threat detection capabilities.",{"header":36,"content":37},"What is an SBOM, and why is it becoming a requirement for federal agencies?","A Software Bill of Materials (SBOM) is a detailed inventory of software components, including open source and third-party dependencies. SBOMs provide visibility into potential security risks and help ensure software integrity. As AI-generated software increases, SBOMs will become essential for tracking vulnerabilities, ensuring compliance, and preventing malicious code contributions from nation-state actors.",{"header":39,"content":40},"What role does AI play in modernizing legacy government code?","Many government systems rely on outdated programming languages that introduce security vulnerabilities. AI can assist in modernizing these legacy code bases by automating refactoring, analyzing security risks, and helping transition from memory-unsafe languages like C to more secure alternatives like Rust or Go. This modernization will help reduce vulnerabilities and improve overall security.",{"header":42,"content":43},"How is AI expected to impact federal cybersecurity in 2025?","AI is expected to play a critical role in federal cybersecurity by proactively preventing cyber attacks, modernizing legacy code, simplifying compliance processes, and enhancing software security through tools like SBOMs. AI-powered threat detection will allow agencies to identify and mitigate risks faster, while automation will improve compliance monitoring and vulnerability management.","yml",{},true,"/en-us/the-source/security/federal-cybersecurity-in-2025-looking-ahead",{"title":15,"description":17,"ogImage":19},"federal-cybersecurity-in-2025-looking-ahead","en-us/the-source/security/federal-cybersecurity-in-2025-looking-ahead","article","F8B3bcI7Pt-J-8GUPZ3WPhravvrmsXkYTyLathqNrmQ",{"data":54},{"text":55,"source":56,"edit":62,"contribute":67,"config":72,"items":77,"minimal":376},"Git is a trademark of Software Freedom Conservancy and our use of 'GitLab' is under license",{"text":57,"config":58},"View page source",{"href":59,"dataGaName":60,"dataGaLocation":61},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/","page source","footer",{"text":63,"config":64},"Edit this page",{"href":65,"dataGaName":66,"dataGaLocation":61},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/content/","web ide",{"text":68,"config":69},"Please contribute",{"href":70,"dataGaName":71,"dataGaLocation":61},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/CONTRIBUTING.md/","please contribute",{"twitter":73,"facebook":74,"youtube":75,"linkedin":76},"https://twitter.com/gitlab","https://www.facebook.com/gitlab","https://www.youtube.com/channel/UCnMGQ8QHMAnVIsI3xJrihhg","https://www.linkedin.com/company/gitlab-com",[78,135,192,251,314],{"title":79,"links":80,"subMenu":96},"Pricing",[81,86,91],{"text":82,"config":83},"View plans",{"href":84,"dataGaName":85,"dataGaLocation":61},"/pricing/","view plans",{"text":87,"config":88},"Why Premium?",{"href":89,"dataGaName":90,"dataGaLocation":61},"/pricing/premium/","why premium",{"text":92,"config":93},"Why Ultimate?",{"href":94,"dataGaName":95,"dataGaLocation":61},"/pricing/ultimate/","why ultimate",[97],{"title":98,"links":99},"Contact Us",[100,105,110,115,120,125,130],{"text":101,"config":102},"Contact sales",{"href":103,"dataGaName":104,"dataGaLocation":61},"/sales/","sales",{"text":106,"config":107},"Support portal",{"href":108,"dataGaName":109,"dataGaLocation":61},"https://support.gitlab.com","support portal",{"text":111,"config":112},"Customer portal",{"href":113,"dataGaName":114,"dataGaLocation":61},"https://customers.gitlab.com/customers/sign_in/","customer portal",{"text":116,"config":117},"Status",{"href":118,"dataGaName":119,"dataGaLocation":61},"https://status.gitlab.com/","status",{"text":121,"config":122},"Terms of use",{"href":123,"dataGaName":124,"dataGaLocation":61},"/terms/","terms of use",{"text":126,"config":127},"Privacy statement",{"href":128,"dataGaName":129,"dataGaLocation":61},"/privacy/","privacy statement",{"text":131,"config":132},"Cookie preferences",{"dataGaName":133,"dataGaLocation":61,"id":134,"isOneTrustButton":46},"cookie preferences","ot-sdk-btn",{"title":136,"links":137,"subMenu":148},"Product",[138,143],{"text":139,"config":140},"DevSecOps platform",{"href":141,"dataGaName":142,"dataGaLocation":61},"/platform/","devsecops platform",{"text":144,"config":145},"AI-Assisted Development",{"href":146,"dataGaName":147,"dataGaLocation":61},"/gitlab-duo/","ai-assisted development",[149],{"title":150,"links":151},"Topics",[152,157,162,167,172,177,182,187],{"text":153,"config":154},"CICD",{"href":155,"dataGaName":156,"dataGaLocation":61},"/topics/ci-cd/","cicd",{"text":158,"config":159},"GitOps",{"href":160,"dataGaName":161,"dataGaLocation":61},"/topics/gitops/","gitops",{"text":163,"config":164},"DevOps",{"href":165,"dataGaName":166,"dataGaLocation":61},"/topics/devops/","devops",{"text":168,"config":169},"Version Control",{"href":170,"dataGaName":171,"dataGaLocation":61},"/topics/version-control/","version control",{"text":173,"config":174},"DevSecOps",{"href":175,"dataGaName":176,"dataGaLocation":61},"/topics/devsecops/","devsecops",{"text":178,"config":179},"Cloud Native",{"href":180,"dataGaName":181,"dataGaLocation":61},"/topics/cloud-native/","cloud native",{"text":183,"config":184},"AI for Coding",{"href":185,"dataGaName":186,"dataGaLocation":61},"/topics/devops/ai-for-coding/","ai for coding",{"text":188,"config":189},"Agentic AI",{"href":190,"dataGaName":191,"dataGaLocation":61},"/topics/agentic-ai/","agentic ai",{"title":193,"links":194},"Solutions",[195,199,204,209,214,218,223,226,231,236,241,246],{"text":196,"config":197},"Application Security Testing",{"href":198,"dataGaName":196,"dataGaLocation":61},"/solutions/application-security-testing/",{"text":200,"config":201},"Automated software delivery",{"href":202,"dataGaName":203,"dataGaLocation":61},"/solutions/delivery-automation/","automated software delivery",{"text":205,"config":206},"Agile development",{"href":207,"dataGaName":208,"dataGaLocation":61},"/solutions/agile-delivery/","agile delivery",{"text":210,"config":211},"SCM",{"href":212,"dataGaName":213,"dataGaLocation":61},"/solutions/source-code-management/","source code management",{"text":153,"config":215},{"href":216,"dataGaName":217,"dataGaLocation":61},"/solutions/continuous-integration/","continuous integration & delivery",{"text":219,"config":220},"Value stream management",{"href":221,"dataGaName":222,"dataGaLocation":61},"/solutions/value-stream-management/","value stream management",{"text":158,"config":224},{"href":225,"dataGaName":161,"dataGaLocation":61},"/solutions/gitops/",{"text":227,"config":228},"Enterprise",{"href":229,"dataGaName":230,"dataGaLocation":61},"/enterprise/","enterprise",{"text":232,"config":233},"Small business",{"href":234,"dataGaName":235,"dataGaLocation":61},"/small-business/","small business",{"text":237,"config":238},"Public sector",{"href":239,"dataGaName":240,"dataGaLocation":61},"/solutions/public-sector/","public sector",{"text":242,"config":243},"Education",{"href":244,"dataGaName":245,"dataGaLocation":61},"/solutions/education/","education",{"text":247,"config":248},"Financial services",{"href":249,"dataGaName":250,"dataGaLocation":61},"/solutions/finance/","financial services",{"title":252,"links":253},"Resources",[254,259,264,269,274,279,284,289,294,299,304,309],{"text":255,"config":256},"Install",{"href":257,"dataGaName":258,"dataGaLocation":61},"/install/","install",{"text":260,"config":261},"Quick start guides",{"href":262,"dataGaName":263,"dataGaLocation":61},"/get-started/","quick setup checklists",{"text":265,"config":266},"Learn",{"href":267,"dataGaName":268,"dataGaLocation":61},"https://university.gitlab.com/","learn",{"text":270,"config":271},"Product documentation",{"href":272,"dataGaName":273,"dataGaLocation":61},"https://docs.gitlab.com/","docs",{"text":275,"config":276},"Blog",{"href":277,"dataGaName":278,"dataGaLocation":61},"/blog/","blog",{"text":280,"config":281},"Customer success stories",{"href":282,"dataGaName":283,"dataGaLocation":61},"/customers/","customer success stories",{"text":285,"config":286},"Remote",{"href":287,"dataGaName":288,"dataGaLocation":61},"https://handbook.gitlab.com/handbook/company/culture/all-remote/","remote",{"text":290,"config":291},"GitLab Services",{"href":292,"dataGaName":293,"dataGaLocation":61},"/services/","services",{"text":295,"config":296},"Community",{"href":297,"dataGaName":298,"dataGaLocation":61},"/community/","community",{"text":300,"config":301},"Forum",{"href":302,"dataGaName":303,"dataGaLocation":61},"https://forum.gitlab.com/","forum",{"text":305,"config":306},"Events",{"href":307,"dataGaName":308,"dataGaLocation":61},"/events/","events",{"text":310,"config":311},"Partners",{"href":312,"dataGaName":313,"dataGaLocation":61},"/partners/","partners",{"title":315,"links":316},"Company",[317,322,327,332,337,342,347,351,356,361,366,371],{"text":318,"config":319},"About",{"href":320,"dataGaName":321,"dataGaLocation":61},"/company/","company",{"text":323,"config":324},"Jobs",{"href":325,"dataGaName":326,"dataGaLocation":61},"/jobs/","jobs",{"text":328,"config":329},"Leadership",{"href":330,"dataGaName":331,"dataGaLocation":61},"/company/team/e-group/","leadership",{"text":333,"config":334},"Team",{"href":335,"dataGaName":336,"dataGaLocation":61},"/company/team/","team",{"text":338,"config":339},"Handbook",{"href":340,"dataGaName":341,"dataGaLocation":61},"https://handbook.gitlab.com/","handbook",{"text":343,"config":344},"Investor relations",{"href":345,"dataGaName":346,"dataGaLocation":61},"https://ir.gitlab.com/","investor relations",{"text":348,"config":349},"Sustainability",{"href":350,"dataGaName":348,"dataGaLocation":61},"/sustainability/",{"text":352,"config":353},"Diversity, inclusion and belonging (DIB)",{"href":354,"dataGaName":355,"dataGaLocation":61},"/diversity-inclusion-belonging/","Diversity, inclusion and belonging",{"text":357,"config":358},"Trust Center",{"href":359,"dataGaName":360,"dataGaLocation":61},"/security/","trust center",{"text":362,"config":363},"Newsletter",{"href":364,"dataGaName":365,"dataGaLocation":61},"/company/contact/#contact-forms","newsletter",{"text":367,"config":368},"Press",{"href":369,"dataGaName":370,"dataGaLocation":61},"/press/","press",{"text":372,"config":373},"Modern Slavery Transparency Statement",{"href":374,"dataGaName":375,"dataGaLocation":61},"https://handbook.gitlab.com/handbook/legal/modern-slavery-act-transparency-statement/","modern slavery transparency statement",{"items":377},[378,381,384],{"text":379,"config":380},"Terms",{"href":123,"dataGaName":124,"dataGaLocation":61},{"text":382,"config":383},"Cookies",{"dataGaName":133,"dataGaLocation":61,"id":134,"isOneTrustButton":46},{"text":385,"config":386},"Privacy",{"href":128,"dataGaName":129,"dataGaLocation":61},{"visibility":46,"title":388,"button":389},"The Intelligent Software Development Era: How AI is reshaping DevSecOps teams",{"config":390,"text":392},{"href":391},"/developer-survey/","Get the research report",{"logo":394,"subscribeLink":399,"navItems":403},{"altText":395,"config":396},"the source logo",{"src":397,"href":398},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1750191004/t7wz1klfb2kxkezksv9t.svg","/the-source/",{"text":400,"config":401},"Subscribe",{"href":402},"#subscribe",[404,408,412],{"text":405,"config":406},"Artificial Intelligence",{"href":407},"/the-source/ai/",{"text":409,"config":410},"Security & Compliance",{"href":411},"/the-source/security/",{"text":413,"config":414},"Platform & Infrastructure",{"href":415},"/the-source/platform/",{"categoryNames":417},{"ai":405,"platform":413,"security":409},{"title":419,"description":420,"submitMessage":421,"formData":422},"The Source Newsletter","Stay updated with insights for the future of software development.","You have successfully signed up for The Source’s newsletter.",{"config":423},{"formId":424,"formName":365,"hideRequiredLabel":46},1077,{"id":426,"title":427,"body":6,"category":6,"config":428,"content":429,"description":6,"extension":44,"meta":445,"navigation":46,"path":446,"seo":447,"slug":7,"stem":448,"testContent":6,"type":449,"__hash__":450},"pages/en-us/the-source/security/index.yml","",{"layout":9},[430,437],{"componentName":431,"type":431,"componentContent":432},"TheSourceCategoryHero",{"title":409,"description":433,"image":434},"Get up to speed on how organizations can ensure they're staying on top of evolving security threats and compliance requirements.",{"config":435},{"src":436},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463273/aplkxrvwpii26xao5yhi.png",{"componentName":438,"type":438,"componentContent":439},"TheSourceCategoryMainSection",{"config":440},{"sourceCTAs":441},[442,443,444],"source-lp-guide-to-dynamic-sboms","source-lp-devsecops-the-key-to-modern-security-resilience","application-security-in-the-digital-age",{},"/en-us/the-source/security",{"title":409,"description":433,"ogImage":436},"en-us/the-source/security/index","category","Yz-XSZ2w3Zg4r2_4aWlzq2kmfduukECmMNfXD6Ha26w",{"config":452,"title":453,"description":454,"link":455},{"slug":13},"How to build a resilient software development practice","Learn strategies to bolster your team's effectiveness amid shifts in the industry with a standardized approach to software development.",{"text":456,"config":457},"Download the guide",{"href":458,"dataGaName":453,"dataGaLocation":459},"/the-source/platform/building-a-resilient-software-development-practice/","thesource",{"id":461,"title":462,"body":6,"category":6,"config":463,"content":464,"description":6,"extension":44,"meta":478,"navigation":46,"path":479,"seo":480,"slug":11,"stem":481,"testContent":6,"type":482,"__hash__":483},"theSourceAuthors/en-us/the-source/authors/joel-krooswyk.yml","Joel Krooswyk",{"layout":9},[465,476],{"componentName":466,"type":466,"componentContent":467},"TheSourceAuthorHero",{"config":468,"name":462,"role":471,"bio":472,"headshot":473},{"gitlabHandle":469,"linkedInProfileUrl":470},"jkrooswyk","https://www.linkedin.com/in/joelrkrooswyk/","Federal CTO","Joel Krooswyk is the Federal CTO at GitLab. Joel has actively been involved in GitLab’s growth since 2017. His 25 years of leadership experience span not only the U.S. Public Sector, but also small, mid-market, and enterprise businesses globally. Joel combines deep government policy expertise with a wealth of experience in technology, software development, AI, and cybersecurity. He is frequently called upon by industry and agencies alike for policy commentary and response.",{"altText":462,"config":474},{"src":475},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463423/mkmdhuxsjggfvokdmdv7.jpg",{"componentName":477,"type":477},"TheSourceArticlesList",{},"/en-us/the-source/authors/joel-krooswyk",{"title":462},"en-us/the-source/authors/joel-krooswyk","author","i75DLuABeVjSJeWcKUolIMQf7SuZpCeNs2Ibd4a8NKM",{"id":426,"title":427,"body":6,"category":6,"config":485,"content":486,"description":6,"extension":44,"meta":495,"navigation":46,"path":446,"seo":496,"slug":7,"stem":448,"testContent":6,"type":449,"__hash__":450},{"layout":9},[487,491],{"componentName":431,"type":431,"componentContent":488},{"title":409,"description":433,"image":489},{"config":490},{"src":436},{"componentName":438,"type":438,"componentContent":492},{"config":493},{"sourceCTAs":494},[442,443,444],{},{"title":409,"description":433,"ogImage":436},[498,507,515],{"config":499,"title":500,"description":501,"link":502},{"slug":444},"Application security in the digital age","Read our survey findings from more than 5,000 DevSecOps professionals worldwide for insights on how organizations are grappling with increasing attack surfaces and changing attitudes towards security and AI.",{"text":503,"config":504},"Read the report",{"href":505,"dataGaName":506,"dataGaLocation":459},"/developer-survey/2024/security-compliance/","Application Security in the Digital Age",{"config":508,"title":509,"description":510,"link":511},{"slug":443},"DevSecOps: The key to modern security resilience","Learn how embedding security in development can slash incident response time by 720x and save millions in security costs annually.",{"text":456,"config":512},{"href":513,"dataGaName":514,"dataGaLocation":459},"/the-source/security/devsecops-the-key-to-modern-security-resilience/","DevSecOps the key to modern security resilience",{"config":516,"title":517,"description":518,"link":519},{"slug":442},"Guide to dynamic SBOMs: An integral element of modern software development","Learn how to gain visibility into previously unidentified organizational risks with a software bill of materials (SBOM).",{"text":520,"config":521},"Read the guide",{"href":522,"dataGaName":523,"dataGaLocation":459},"/the-source/security/guide-to-dynamic-sboms/","Guide to Dynamic SBOMs",1772652091802]