Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Lineaje: Self-Healing Code or Just Magic?

Truth in IT
06/18/2025
85
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett Small World Big Data and we are here just after RSAC 2025, catching up with a few more folks. We've got Lineaje here to talk about one of the latest and greatest things they're doing in the cybersecurity space, looking at your software supply chains and how do you secure those? Which was a hot topic. So just hang on. Hey, Nick, uh, it's been just a minute since we talked. How are you doing? I'm doing well. Mike, how are you doing? All right, so this world's moving pretty fast. Uh, you know, we we did something a couple months ago, uh, on looking at what Lineaje is doing in Lineaje with the software build materials and the software supply chain and trying to really secure that open source thing for folks. Uh, and we just had rsac, uh, you know, just a tremendous show, uh, on security. And, uh, we just wanted to catch up with you as well, uh, as to what's going on new here, supply chain was a big thing. Maybe just start by telling us what what what world are we talking about here? Software, Bill of materials and software. Supply chain. What is that about? Yeah. No. Absolutely. So when we're talking about software supply chain, software bill of materials, you know what we're seeing is about majority of the software is coming from open source. About 7,090% software is open source. So really looking at what are all the risks that are being brought in through the open source components software developers are using. And, you know, through our analysis, we find that about 95% of the risk in software is coming from the open source packages that they're they're bringing in. It's really easy today to put together open source packages. And this isn't even introducing the topic of vibe coding or having AI help us code software, because we understand that brings in even more risks as it as it makes up stuff. Right? Absolutely. Yeah. No, we're talking about, you know, your your everyday software development. Right. So, uh, as I mentioned, 95% of the risk comes from from open source is what we're finding. And that also about 56% of those risks actually can't be remediated by by your own development teams for a variety of reasons. It's probably even like the first problem is that people have no real clue as to how deep their open source dependency chains really go, right? Because. Because one package can include other packages which includes other packages. And so something like Log4j2 happens again. They just really aren't even going to be any better prepared for it normally than they were the first time. Yeah. No, absolutely. And I mean, based on our assessment from all the different customers that we work with, we're seeing some of these open source nested dependencies go down to almost 60 levels deep. Um, and issues and risks can live in any one of those different levels. And in fact, we know a lot of our, uh, the bad actors are taking advantage of that. Right. And taking advantage of that opaqueness in the supply chain. Right. And I wasn't just being facetious with that vibe coding. I did hear some stories of people saying, the AI coder told me to include these other packages, and those packages didn't even exist. They were made up. And then bad actors are figuring out the AI is recommending those bad packages and making those bad packages that are, you know, it's just kind of a crazy world. Uh. It is it is crazy. And actually, one of the things that we do as part of our solution is we. We check the source of every one of the open source, making sure that those packages are actually valid and good known sources and not, uh, you know, uh, a typo squatted or or worse. All right. So we are, you know, we just we did something with you just recently, but we've got a sort of a shift here, too. You guys are developing and moving as fast as the rest of the security world here. Uh, tell us a little bit about how you've evolved your thinking and your approach at Lineaje to now make, uh, this software supply chain security, uh, more. I don't say dynamic or more continuous. How would you describe it? Yeah. No, that's a great question. So one of the things we've been focusing on is how do we solve the challenges associated with software supply chain security and working with our customers. And obviously understanding what's in your supply chain is number one. Number two, understanding the risks. And we've done that. However, you know, we kept bumping into the question of how do I remediate this risk. And so we we moved to this path of all right we're going to provide you recommendations really targeted recommendations on what to do. And we discovered that our that our customers said, hey, this is great, but we still can't do it. Our developers are still challenged with making these fixes. And so we said, well, what's going on here? So we dug a little deeper, and some of the things we found out was when they make these recommended fixes, it breaks their software. Right. And it breaks their software for a variety of reasons. Software structures are extremely complex. And uncovering that it takes a lot of work. And so as we kept digging here, our goal is how do we get how do we solve this problem for our customers? Right. Can we do this? And so out of that whole exercise, really, we came up with three new innovations that that we've launched recently. The first one is called uh, Gold Open Source. So similar to, you know, in the old days when we had gold images, these are gold open source packages and container images that are pre-vetted free of vulnerabilities. We've taken we've done all the testing around it. So we know it's from an integrity standpoint. It's safe and we know all of its provenance and all its details. So now your developers can actually start with clean, if you will, open source or gold open source that is free of vulnerabilities as opposed to trying to patch it later. So that was number one. Um, in terms of the innovations that we launched, the second thing we realized is it's not so easy to, uh, update to a fixed version, if you will, of open source. There are many reasons, as I mentioned before, that's like compatibility reasons that will break your software. Sometimes it's the, you know, do you have the right skill set for the type of language or the package managers that that developers are using to make this happen? So, uh, the other two innovations that we focused on and have delivered is what we're calling, you know, kind of the self-healing concept where we will actually write in your source code, uh, create a branch right in your source code, all the fixes or all the remediation. That way your teams don't have to. We've done that heavy lifting for you using our AI capabilities. And then we do it also at the container level, because sometimes suffixes have to be at the container, not not necessarily in source code. And we're able to do that again through I make it compatible so it won't break your software. And we do this kind of as an offline parallel effort. So the development teams can actually test it, validate the software still works. And the remediations are are performed correctly. So it seems like there's a couple of ways to think about this. One is, you know, you're sticking your fingers in there and actually creating adding Band-Aids to the security risks that are in there. But another way is probably more more generous to say it makes it more self-healing, right? So some so someone's writing code and you're coming in and saying, well, there's some risks here. We'll just we will automatically, as you're saying, address those risks and lower those vulnerabilities so they don't have to. That was just something will come in and layer on from an automated perspective. Right. So that's kind of cool. Yeah. And that is correct. And also we know you know software is dynamic. It's not static. And so continuously monitoring the supply chain and software making these changes as, uh, as new risks emerge. Yeah. And I like the fact that you're, you're able to to do that at the source code level and also at the container and the container definition levels, because things can go bad at those levels. And I'm assuming as the bad guys get better at being bad, there's going to be some other things you're going to, you know, have to create and come up with too. But this looks to be like a really interesting way to, uh, create ongoing. What what would you call it? Transformations that I think you called it that, that just really address risk continuously. No, that's right, that's right. And leveraging AI so that we, you know, free up developers time so they can build new features and capabilities versus having to, you know, patch vulnerabilities all day. Yeah. Uh, and this is a good use of AI from my perspective, because it's something you, you, the experts are using your AI and doing all the great governance and monitoring and guardrails and stuff on your side. You're not embedding some AI piece into the customer's environment. That's that could go wrong or hallucinate or anything. Right? This is this is your your use of it. That's exactly right. And so we're we're basically building in the fixes, if you will, at source code and container. And we're not leveraging a JNI to write code. Right. We're actually using our expertise training the AI on how to how to implement the fixes. Right. Awesome, awesome. So, uh, I think that's all we really have time here to squeeze this into our RSA coverage. Uh, if someone wants to find out more about your unique, uh, self-healing approach to this, uh, securing the software bill of materials, the software supply chain. Nick, what would you have them do? Yeah, absolutely. You know, uh, go to our website lineaje.com and request a demo or send an email to sales@lineaje.com. Awesome. Thank you for being here again. And do come back around when you've got yet another take on this, because this is a fast evolving field. I'm sure there's going to be more news soon on every front, so take care. Nick. Thank you. Thank you very much, Mike.
Mike Matchett talks with Nick Mistry of Lineaje about today’s open-source software risk and why your SBOM isn’t enough. Mistry explains how 90% of modern software is built on open-source components, often with 60+ layers of nested dependencies. With bad actors increasingly exploiting package opaqueness and AI coding tools recommending non-existent libraries, the software supply chain has become a minefield. Lineaje’s new innovations include pre-vetted "Gold" open-source libraries, AI-powered remediation that generates patches in source code or containers, and continuous monitoring across builds.

Developers don’t have to stop and triage security risks, Lineaje flags them and suggests fixes automatically, helping teams move faster without leaving vulnerabilities behind. If your dev pipeline feels like a vulnerability factory, Lineaje offers a smarter way to secure it.
Categories:
  • » Cybersecurity Webinars
  • » Small World Big Data
  • » Cybersecurity Webinars » Data Security
  • » Cybersecurity Webinars » Application Security
  • » Cybersecurity Webinars » Identity & Access Management (IAM)
Channels:
News:
Events:
Tags:
  • inbrief
  • matchett
  • lineaje
  • sbom
  • security
  • cybersecurity
  • data
  • security
  • open-source
  • dependency
  • dependencies
  • ai
  • artificial
  • intelligence
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Lineaje: Self-Healing Code or Just Magic?

              Upcoming Webinar Calendar

              • 11/18/2025
                01:00 PM
                11/18/2025
                HUMAN Dialogue: Cultivating Trust Amidst the Rise of Agentic Commerce
                https://www.truthinit.com/index.php/channel/1582/human-dialogue-cultivating-trust-amidst-the-rise-of-agentic-commerce/
              • 11/18/2025
                01:00 PM
                11/18/2025
                Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook
                https://www.truthinit.com/index.php/channel/1579/microsoft-advanced-group-policy-management-agpm-end-of-life-your-practical-migration-playbook/
              • 11/20/2025
                05:00 AM
                11/20/2025
                Druva: Prove you can outsmart ransomware in this virtual cyber recovery simulation!
                https://www.truthinit.com/index.php/channel/1619/untitled-channel/
              • 11/20/2025
                11:00 AM
                11/20/2025
                Trend Micro Webinar: Smarter Decision Making via Network Intelligence
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 11/20/2025
                12:00 PM
                11/20/2025
                CMMC Certification: Next Steps for Continuous Monitoring and Management
                https://www.truthinit.com/index.php/channel/1558/cmmc-certification-next-steps-for-continuous-monitoring-and-management/
              • 11/20/2025
                01:00 PM
                11/20/2025
                Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era
                https://www.truthinit.com/index.php/channel/1612/rethinking-hybrid-access-securing-users-vendors-and-infrastructure-in-the-zero-trust-era/
              • 12/02/2025
                01:00 PM
                12/02/2025
                The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security
                https://www.truthinit.com/index.php/channel/1629/the-invisible-threat-how-polymorphic-malware-is-outsmarting-your-email-security/
              • 12/02/2025
                01:00 PM
                12/02/2025
                Begin Your Journey with Netwrix for Effective Data Management
                https://www.truthinit.com/index.php/channel/1631/begin-your-journey-with-netwrix-for-effective-data-management/
              • 12/04/2025
                12:00 PM
                12/04/2025
                CMMC Level 2 Assessment Insights: Expectations from an OSC and C3PAO Assessor
                https://www.truthinit.com/index.php/channel/1557/cmmc-level-2-assessment-insights-expectations-from-an-osc-and-c3pao-assessor/
              • 12/09/2025
                01:00 PM
                12/09/2025
                Energize Your Connections with Netskope and Presidio Collaboration
                https://www.truthinit.com/index.php/channel/1553/energize-your-connections-with-netskope-and-presidio-collaboration/
              • 12/10/2025
                01:00 PM
                12/10/2025
                The Next Generation of Managed Data Security Services
                https://www.truthinit.com/index.php/channel/1620/cyera-the-next-generation-of-managed-data-security-services/
              • 12/10/2025
                01:00 PM
                12/10/2025
                HUMAN Dialogue: Uncovering True Insights to Safeguard Performance through Page-Level Intelligence
                https://www.truthinit.com/index.php/channel/1630/human-dialogue-uncovering-true-insights-to-safeguard-performance-through-page-level-intelligence/
              • 12/10/2025
                10:00 PM
                12/10/2025
                Maximize Revenue Opportunities with Druva’s Microsoft Expansion in APAC
                https://www.truthinit.com/index.php/channel/1624/maximize-revenue-opportunities-with-druvas-microsoft-expansion-in-apac/
              • 12/11/2025
                05:00 AM
                12/11/2025
                Maximize Revenue Potential: Address Gaps with Druva’s Microsoft Expansion
                https://www.truthinit.com/index.php/channel/1625/maximize-revenue-potential-address-gaps-with-druvas-microsoft-expansion/
              • 12/11/2025
                12:00 PM
                12/11/2025
                Secureframe: Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions
                https://www.truthinit.com/index.php/channel/1526/addressing-the-top-5-compliance-challenges-for-startup-leaders-and-solutions/
              • 12/11/2025
                01:00 PM
                12/11/2025
                Enhance Revenue Streams: Address Gaps with Druva's Microsoft Expansion Solutions.
                https://www.truthinit.com/index.php/channel/1623/enhance-revenue-streams-address-gaps-with-druvas-microsoft-expansion-solutions/
              • 12/18/2025
                12:00 PM
                12/18/2025
                360View: 2026 IT Predictions & Emerging Trends
                https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/

              Upcoming Spotlight Events

              • Nov
                18

                Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook

                11/18/202501:00 PM ET
                • Nov
                  20

                  Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                  11/20/202501:00 PM ET
                  • Dec
                    02

                    The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                    12/02/202501:00 PM ET
                    More events

                    Upcoming Industry Events

                    • Nov
                      18

                      HUMAN Dialogue: Cultivating Trust Amidst the Rise of Agentic Commerce

                      11/18/202501:00 PM ET
                      • Nov
                        20

                        Trend Micro Webinar: Smarter Decision Making via Network Intelligence

                        11/20/202511:00 AM ET
                        • Nov
                          20

                          CMMC Certification: Next Steps for Continuous Monitoring and Management

                          11/20/202512:00 PM ET
                          More events

                          Upcoming 360 View Events

                          • Dec
                            18

                            360View: 2026 IT Predictions & Emerging Trends

                            12/18/202512:00 PM ET
                            More events

                            Recent Spotlight Events

                            • Oct
                              22

                              Cut Ticket Resolution Time in Half with Smarter IT Documentation

                              10/22/202501:00 PM ET
                              • Oct
                                15

                                Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough?

                                10/15/202501:00 PM ET
                                • Sep
                                  16

                                  KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield

                                  09/16/202501:00 PM ET
                                  More events

                                  Recent Industry Events

                                  • Nov
                                    13

                                    Transforming AI Trends into Tangible Business Success with Druva

                                    11/13/202501:00 PM ET
                                    • Nov
                                      13

                                      Advancements in Click Fraud Prevention: Insights from LinkedIn and HUMAN

                                      11/13/202501:00 PM ET
                                      • Nov
                                        13

                                        Insights from a Certified CMMC Assessor: Sidestepping Common Assessment Pitfalls

                                        11/13/202512:30 PM ET
                                        More events
                                        Truth in IT
                                        • Sponsor
                                        • About Us
                                        • Terms of Service
                                        • Privacy Policy
                                        • Contact Us
                                        • Preference Management
                                        Desktop version
                                        Standard version