Exploring the Future of AI SOC
This article will cover the challenges that arrived with the first wave of AI SOC tools, and how a second wave of AI SOC tools are addressing these concerns
This article will cover the challenges that arrived with the first wave of AI SOC tools, and how a second wave of AI SOC tools are addressing these concerns
Collecting all of the best research on Shai Hulud 2.0 in one place
After meeting with every cloud security provider on the market, practitioners, and buyers, we’ve mapped out the past, present, and future of cloud security into an actionable and industry defining report. This report is for teams building their security programs, looking to understand the latest developments and approaches vendors
Responder Resources
0:00 /0:15 1× Over the last few months, we’ve seen an onslaught of AI Security acquisitions - all at strong margins for investors. One might look at these and think they’re all the same, but each actually tells a slightly different story. We just published an
Read Latio's Latest Report on AI Security
An honest product review on Sweet Security highlighting the the pros and cons of their platform
Explaining what containers are and aren't, and how to use them
Date: May 12, 2025 Guest: Daniel Pacak (Software Engineer, Miggo) Hosts: James Berthoty, Charrah Hardamon Topic: Building Real Runtime Security with eBPF In this episode, we go deep on eBPF and what it actually takes to build reliable, performant runtime detection, beyond the buzzwords. James and Charrah are joined by
The key takeaways after attending RSAC 2025 for practitioners and buyers
Pt. 3 of our runtime reachability series uncovers the different types of runtime reachability
Unpacking Runtime Cloud Security in 2025, explaining CADR with use cases, and more