Full executive brief:
securingthebackbone.com/blog/stb-exe...
@ericgallagher.bsky.social
πͺ Author of "Securing the Backbone" newsletter | Challenging the status quo in software supply chain security | πTrying to make running a habit | πΎTennis and β οΈpoker nerd | WV
Full executive brief:
securingthebackbone.com/blog/stb-exe...
The organization didnβt eliminate the work.
It made the work continuous.
Thatβs not failure.
Thatβs a shift from deferred cost to recurring cost.
If teams close issues faster but new ones keep flowing in at the same rate, the system looks cleaner while labor demand stays flat β or rises.
02.02.2026 14:35 β π 0 π 0 π¬ 1 π 0Backlog metrics measure inventory.
Cost reflects throughput.
You can reduce the pileβ¦
while the conveyor belt keeps running just as fast.
Your vulnerability backlog is shrinking.
Your remediation costs arenβt.
Both can be true at the same time.
π Get the full report from ActiveState to see the complete findings and benchmarks.
www.activestate.com/resources/20...
If container security and compliance are part of your 2026 priorities, the full 2026 State of Vulnerability Management & Remediation Report: Container Security Edition breaks down exactly where organizations are falling behind, and whatβs replacing broken approaches.
06.01.2026 14:06 β π 1 π 0 π¬ 1 π 0The real failure point is remediation:
β Outdated base images
β Inherited CVEs
β Manual fixes that canβt keep up with ephemeral containers
The report shows that container adoption has outpaced security maturity, turning audits into a recurring risk event instead of a checkpoint.
π¨ 78% of organizations have likely failed a compliance audit due to CVEs in container images.
Not because teams arenβt scanning.
Not because they donβt care about security.
But because finding vulnerabilities is no longer the hard part.
When compromise propagates inside the ecosystem itself, there is no clear breach moment and often nothing to βpatch.β
This shift is explored further in a recent STB Executive Brief written for executive leadership. Reach out if you want a copy.
Some of the most disruptive software supply-chain attacks no longer exploit vulnerabilities.
They exploit trust, automation, and legitimate access β spreading through authorized workflows rather than breaking in.
I donβt know you, just found your feed, but donβt stop. Decline or not, youβre running, and thatβs a win. βThe best run is the run you CAN do nowβ
01.01.2026 14:04 β π 2 π 0 π¬ 1 π 0Hereβs a little glimpse into the future. Go @sanfrancisco49ers.bsky.social !
31.12.2025 15:12 β π 2 π 1 π¬ 0 π 0Solutions like @ActiveState focus on preventing untrusted code from entering the pipeline in the first place, not just reacting after the fact.
Because when software can infect software, βjust patch itβ stops being a strategy.
It becomes a liability.
The real fix is control:
βοΈ controlling which open-source packages enter the organization
βοΈ controlling how builds are composed
βοΈ controlling who can publish, pull, and promote artifacts
This is where curated catalogs, immutable builds, and hardened base images matter.
This new class of supply-chain attack spreads inside trusted developer workflows:
β’ no zero-days
β’ no obvious malware
β’ no CVEs to patch
Just automation + trust + public dependencies.
Thatβs why detection alone wonβt stop it.
Shai Hulud isnβt scary because itβs sophisticated.
Itβs scary because itβs allowed.
If you're in those boardroom conversations talking about CVE's, I expand on this further in this month's STB Executive Brief.
30.12.2025 01:24 β π 1 π 0 π¬ 0 π 0As scanning improves, numbers rise, remediation effort compounds, and leadership confidence can move in the wrong direction.
That gap rarely makes it into board conversations.
CVE counts are often treated as a proxy for security risk.
In reality, they measure visibility, not exposure β and say little about the labor required to manage that risk over time.
π¨ Python devs targeted in phishing scam spoofing PyPI!
Emails urge you to βverifyβ your account via pypj[.]orgβa fake site stealing credentials.
β
Donβt click links
β
Use MFA
β
Go directly to pypi.org
Stay sharp.