{
    "componentChunkName": "component---src-templates-landing-page-minimal-tsx",
    "path": "/resources/webinar/uncover-hidden-vulnerabilities-with-dependency-track",
    "result": {"pageContext":{"data":{"calendar_title":null,"calendar_embed":{"url":""},"calender_heading":null,"calender_subheading":null,"calender_body":{"html":"","raw":[],"text":""},"calender_image":{"url":null,"alt":null},"presenters":[],"page_icon":{"url":null,"alt":null},"top_image":{"url":null,"alt":null},"page_meta_thumbnail":{"alt":"A graphic for an amazee.io webinar titled \"Uncover Hidden Vulnerabilities: Continuous Software Security with Dependency-Track.\" The graphic includes a tablet displaying the webinar cover with photos of presenters Lauren Morris (Head of Product) and Sean Hamlin (Principal Architect).","copyright":null,"url":"https://images.prismic.io/amazeeio/adeX651ZCF7ETBny_continuous-software-security-dependency-track-webinar-teaser.jpg?auto=format%2Ccompress","thumbnails":null},"page_meta_description":"Master continuous software security with Dependency-Track. Learn to automate SBOMs, use VEX to kill false positives, and prioritize threats with EPSS. Watch now.","canonical_url":null,"page_meta_title":"Uncover Hidden Vulnerabilities with Dependency-Track","landing_page_minimal_title":{"html":"<h1>Watch On-Demand: Uncover Hidden Vulnerabilities - Continuous Software Security with Dependency-Track</h1>","raw":[{"type":"heading1","text":"Watch On-Demand: Uncover Hidden Vulnerabilities - Continuous Software Security with Dependency-Track","spans":[],"direction":"ltr"}],"text":"Watch On-Demand: Uncover Hidden Vulnerabilities - Continuous Software Security with Dependency-Track"},"featured_title":{"html":"","raw":[],"text":""},"landing_page_minimal_subtitle":{"html":"<p>Modern web applications move fast, but many teams still treat software supply chain risk as a periodic task. In this on-demand webinar, you’ll learn how to detect actively exploited vulnerabilities, enforce policy gates automatically in CI/CD, reduce false positives with VEX, and provide security and compliance teams with a single, auditable source of truth.</p><p><br /></p><p>This webinar is ideal for platform, security, and governance teams who want to manage dependency risk without adding extra operational work.</p><p></p><h2>What You’ll Learn</h2><ul><li>What Dependency-Track is, and why static SBOMs (Software Bills of Materials) leave gaps between scans</li><li>How EPSS (Exploit Prediction Scoring System) highlights actively exploited vulnerabilities</li><li>How VEX (Vulnerability Exploitability eXchange) silences false positives and proves non-reachability</li><li>How to connect Dependency-Track to your CI/CD pipeline for automated SBOM uploads</li><li>How managed hosting removes the overhead of running a Java app backed by PostgreSQL</li></ul>","raw":[{"type":"paragraph","text":"Modern web applications move fast, but many teams still treat software supply chain risk as a periodic task. In this on-demand webinar, you’ll learn how to detect actively exploited vulnerabilities, enforce policy gates automatically in CI/CD, reduce false positives with VEX, and provide security and compliance teams with a single, auditable source of truth.","spans":[],"direction":"ltr"},{"type":"paragraph","text":"\n","spans":[],"direction":"ltr"},{"type":"paragraph","text":"This webinar is ideal for platform, security, and governance teams who want to manage dependency risk without adding extra operational work.","spans":[],"direction":"ltr"},{"type":"paragraph","text":"","spans":[],"direction":"ltr"},{"type":"heading2","text":"What You’ll Learn","spans":[],"direction":"ltr"},{"type":"list-item","text":"What Dependency-Track is, and why static SBOMs (Software Bills of Materials) leave gaps between scans","spans":[],"direction":"ltr"},{"type":"list-item","text":"How EPSS (Exploit Prediction Scoring System) highlights actively exploited vulnerabilities","spans":[],"direction":"ltr"},{"type":"list-item","text":"How VEX (Vulnerability Exploitability eXchange) silences false positives and proves non-reachability","spans":[],"direction":"ltr"},{"type":"list-item","text":"How to connect Dependency-Track to your CI/CD pipeline for automated SBOM uploads","spans":[],"direction":"ltr"},{"type":"list-item","text":"How managed hosting removes the overhead of running a Java app backed by PostgreSQL","spans":[],"direction":"ltr"}],"text":"Modern web applications move fast, but many teams still treat software supply chain risk as a periodic task. In this on-demand webinar, you’ll learn how to detect actively exploited vulnerabilities, enforce policy gates automatically in CI/CD, reduce false positives with VEX, and provide security and compliance teams with a single, auditable source of truth. \n This webinar is ideal for platform, security, and governance teams who want to manage dependency risk without adding extra operational work.  What You’ll Learn What Dependency-Track is, and why static SBOMs (Software Bills of Materials) leave gaps between scans How EPSS (Exploit Prediction Scoring System) highlights actively exploited vulnerabilities How VEX (Vulnerability Exploitability eXchange) silences false positives and proves non-reachability How to connect Dependency-Track to your CI/CD pipeline for automated SBOM uploads How managed hosting removes the overhead of running a Java app backed by PostgreSQL"},"urlslug":"resources/webinar/uncover-hidden-vulnerabilities-with-dependency-track","youtube_embed_url":null,"template_type":"Default","page_classes":"smallertext","cta_text":null,"display_content_as_column_grid":true,"number_of_columns":null,"content_blocks":[],"form_featured_image":{"alt":"A promotional graphic centered on a bright blue circular background. The graphic shows the amazee.io webinar invitation for \"Continuous Software Security with Dependency-Track\" alongside a 3D technical illustration of secure data blocks.","copyright":null,"url":"https://images.prismic.io/amazeeio/adedbZ1ZCF7ETBvt_webinar-dependency-track-software-security.png?auto=format%2Ccompress","thumbnails":null},"form_featured_description":{"html":"<h3>What you’ll get:</h3><p></p><ul><li>New vulnerabilities are constantly being discovered in open-source dependencies, often long after they’ve already been deployed to production. Without continuous monitoring, critical risks can sit unnoticed for weeks.</li></ul><p></p><ul><li>Regulators and customers increasingly expect proof that you actively manage software supply chain risk, not just run occasional scans.</li></ul><p></p><ul><li>Most teams lack real-time visibility into which applications are affected when a new vulnerability appears, slowing response and increasing exposure.</li></ul><p></p><ul><li>In this session, you’ll learn how to take control with continuous SBOM analysis using Dependency-Track so your team can detect, prioritize, and manage dependency risks without adding operational overhead.</li></ul>","raw":[{"type":"heading3","text":"What you’ll get:","spans":[],"direction":"ltr"},{"type":"paragraph","text":"","spans":[],"direction":"ltr"},{"type":"list-item","text":"New vulnerabilities are constantly being discovered in open-source dependencies, often long after they’ve already been deployed to production. Without continuous monitoring, critical risks can sit unnoticed for weeks.","spans":[],"direction":"ltr"},{"type":"paragraph","text":"","spans":[],"direction":"ltr"},{"type":"list-item","text":"Regulators and customers increasingly expect proof that you actively manage software supply chain risk, not just run occasional scans.","spans":[],"direction":"ltr"},{"type":"paragraph","text":"","spans":[],"direction":"ltr"},{"type":"list-item","text":"Most teams lack real-time visibility into which applications are affected when a new vulnerability appears, slowing response and increasing exposure.","spans":[],"direction":"ltr"},{"type":"paragraph","text":"","spans":[],"direction":"ltr"},{"type":"list-item","text":"In this session, you’ll learn how to take control with continuous SBOM analysis using Dependency-Track so your team can detect, prioritize, and manage dependency risks without adding operational overhead.","spans":[],"direction":"ltr"}],"text":"What you’ll get:  New vulnerabilities are constantly being discovered in open-source dependencies, often long after they’ve already been deployed to production. Without continuous monitoring, critical risks can sit unnoticed for weeks.  Regulators and customers increasingly expect proof that you actively manage software supply chain risk, not just run occasional scans.  Most teams lack real-time visibility into which applications are affected when a new vulnerability appears, slowing response and increasing exposure.  In this session, you’ll learn how to take control with continuous SBOM analysis using Dependency-Track so your team can detect, prioritize, and manage dependency risks without adding operational overhead."},"download_link_text":null,"download_link":{"url":"","target":null},"mobile_form_featured_description":{"html":"","raw":[],"text":""},"form_subtitle":null,"hubspot_form_title":"Access the webinar recording now","hubspot_form_portal_id":"5096486","hubspot_form_id":"7cdf3749-d782-4291-9aec-37988231747c","hubspot_form_id_b":null,"featured_hero_content":{"html":"","raw":[],"text":""},"featured_hero_image":{"alt":null,"copyright":null,"url":null,"thumbnails":null},"featured_background_image":{"alt":null,"copyright":null,"url":null,"thumbnails":null},"link_color_override":null}}},
    "staticQueryHashes": ["1659250047","2244888832","3350517190"]}