
Crypto group ushers in post-quantum security
Here’s a look at the Ethereum Foundation’s new PQC security effort — and why you need to modernize your SecOps.
Build system telemetry refers to the automated collection, monitoring, and analysis of data generated during software build processes. This telemetry includes metadata about build activities, user actions, system state, configuration changes, tool usage, failures, and artifact generation.
It provides continuous visibility into how software is being built, helping organizations ensure security, performance, and compliance across their CI/CD pipelines and software supply chains.
Build systems are high-value targets in the software supply chain. They orchestrate the transformation of source code into deliverable artifacts. Without telemetry:
Build system telemetry enhances observability and trust, particularly in regulated environments and secure development pipelines.
Telemetry data is collected automatically at runtime by agents, logging modules, or orchestration tools integrated with CI/CD platforms (e.g., Jenkins, GitHub Actions, GitLab CI, CircleCI). Typical telemetry includes:
This data is typically stored in log management or SIEM systems and can be analyzed for anomalies, performance metrics, or compliance violations.
Concept | Focus Area | Key Differences |
|---|---|---|
Runtime Telemetry | Post-deployment app behavior | Build system telemetry focuses on pre-deployment build activity |
CI/CD Monitoring | Pipeline status and health | Telemetry includes deeper data about build steps, users, and artifacts |
Log Management | Aggregating system logs | Build telemetry is a specialized subset relevant to DevSecOps |

Here’s a look at the Ethereum Foundation’s new PQC security effort — and why you need to modernize your SecOps.

AI agents create novel attack surfaces and control issues that require rethinking assumptions — and AppSec tooling.

Here's how to assess a sample using Spectra Analyze in your environment — and create a YARA rule.