Operations | Monitoring | ITSM | DevOps | Cloud

The 2026 software supply chain security gap

AI-generated code is now nearly universal. Enforcement is not. That gap is where your software supply chain is most exposed. Cloudsmith's CEO Glenn Weinstein, Co-Founder & CTO Lee Skillen, and VP of Product Alison Sickelka join Product Marketing Manager Meghan McGowan to unpack the 2026 State of Artifact Management report – a survey-based look at how AI development is reshaping the threat landscape, what organizations are getting wrong, and what the highest-leverage fix actually looks like.

Cloudsmith raises $72M Series C to secure the AI software supply chain

Cloudsmith raised $72 million in Series C funding, led by TCV and Insight Partners, to build the operating system for the modern software supply chain. AI agents are writing code faster than teams can secure it. That shifts the risk calculus because more software, built faster, means more attack surface. Artifact management is the control point between every software producer and consumer, and it's where Cloudsmith sits.

What is Vendor Due Diligence in Operations Management?

Vendor due diligence is the aggressive, systematic interrogation of a third-party supplier's financial, legal, and operational reality before a contract is signed. It prevents catastrophic supply chain failures. Procurement prioritizes unit cost. Operations demands continuity. Trusting a vendor's glossy sales pitch is a fast track to factory floor paralysis.

How Uninterruptible Power Tech is Shielding Automated Supply Chains from Grid Failures

Modern supply chains are unrecognisable from those of just a decade ago. Today, vast warehouses operate with precision choreography, relying heavily on autonomous robotics, advanced sensor networks, and real-time edge computing. However, this hyper-efficiency has a distinct and growing vulnerability. As operations become entirely dependent on continuous electricity, any disruption to the power supply can bring a highly automated logistics hub to a grinding halt.

npm axios attack - What happened and how to protect your supply chain

100M+ weekly downloads. One compromised maintainer account. A remote access trojan in two active release branches. This is a 30-minute breakdown of the Axios npm supply chain attack – how it happened, why it was hard to detect, and what any engineering team can do right now to reduce exposure. Nigel Douglas, Head of Developer Relations at Cloudsmith, is joined by Jenn Gile, co-founder of Open Source Malware, a community-driven threat intelligence platform focused on malicious open source packages.

Emerging Cyber Threats Every Organization Should Know

Cyber threats in 2026 are evolving faster than most organizations can comfortably manage. Attackers are using automation, artificial intelligence, and scalable attack models to target businesses of every size. What used to be handled in isolation by IT teams is now a boardroom concern. A single breach can disrupt operations, damage trust, and create long-term financial consequences. Leaders are starting to recognize that cybersecurity is not just about tools but about strategy, governance, and accountability across the organization.

Hot code burns: the supply chain case for letting your containers cool before you ship

In September 2025, dozens of popular JavaScript packages, like chalk and debug, were compromised on the npm registry. These packages are so ubiquitous they end up in everything: front-end apps, back-end microservices, and CI tooling. Developers didn’t do anything wrong, they just ran the same command they always do: npm install chalk. But then the malware arrived silently. This wasn’t a bug in an operating system. It wasn’t a virus on someone’s laptop.

The Role of Automatic Gates in Efficient Commercial Operations

Managing a commercial property involves balancing many moving parts at once. Owners and managers must oversee site safety, traffic flow, and staff access daily. One of the most effective ways to streamline these tasks is through the installation of automated entry systems. These setups replace manual labor with reliable technology that works around the clock.

How to Spot Vulnerabilities in Your Supply Chain Quickly

Ensuring shipments are secure before leaving a warehouse is essential for preventing losses and delays. Essential checks before approving a shipment for dispatch include verifying documentation, inspecting packaging, and confirming that transport processes are properly followed. Completing these checks helps logistics teams detect potential problems before they escalate into costly issues. Supply chain vulnerabilities can disrupt operations, create financial risks, and damage a company's reputation. Taking proactive steps ensures that goods reach their destination safely and efficiently.