<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Post-Deployment Vulnerability Management on Ortelius</title>
    <link>/tags/post-deployment-vulnerability-management/</link>
    <description>Recent content in Post-Deployment Vulnerability Management on Ortelius</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Tue, 21 Apr 2026 10:51:48 -0600</lastBuildDate>
    <atom:link href="/tags/post-deployment-vulnerability-management/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>SecureChainCon 2026</title>
      <link>/blog/2026/04/06/securechaincon-2026/</link>
      <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
      <guid>/blog/2026/04/06/securechaincon-2026/</guid>
      <description>SecureChainCon 2026</description>
    </item>
    <item>
      <title>Why Post-Deployment Endpoint Detection Is Now Critical</title>
      <link>/blog/2026/04/01/why-post-deployment-endpoint-detection-is-now-critical/</link>
      <pubDate>Wed, 01 Apr 2026 00:00:00 +0000</pubDate>
      <guid>/blog/2026/04/01/why-post-deployment-endpoint-detection-is-now-critical/</guid>
      <description>&lt;p&gt;Most security teams still treat vulnerability management as a build-time activity. But attackers don’t. Modern supply-chain attacks don’t target source code repositories or CI pipelines alone, they mainly target running systems. Production is now the real attack surface, and organizations that stop security at deployment leave their most critical infrastructure exposed.&lt;/p&gt;&#xA;&lt;p&gt;It’s time to rethink how vulnerability detection works.&lt;/p&gt;&#xA;&lt;h2 id=&#34;the-production-security-gap&#34;&gt;The Production Security Gap&lt;/h2&gt;&#xA;&lt;p&gt;Today’s security tooling is heavily weighted toward pre-deployment scanning:&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
