
Qix NPM Supply Chain Attack: What Teams Need to Know
Responder Resources
Responder Resources
0:00 /0:15 1× Over the last few months, we’ve seen an onslaught of AI Security acquisitions - all at strong margins for investors. One might look at these and think they’re all the same, but each actually tells a slightly different story. We just published an
Bringing clarity to the marketing madhouse
An honest product review on Sweet Security highlighting the the pros and cons of their platform
Explaining what containers are and aren't, and how to use them
Date: May 12, 2025 Guest: Daniel Pacak (Software Engineer, Miggo) Hosts: James Berthoty, Charrah Hardamon Topic: Building Real Runtime Security with eBPF In this episode, we go deep on eBPF and what it actually takes to build reliable, performant runtime detection, beyond the buzzwords. James and Charrah are joined by
The key takeaways after attending RSAC 2025 for practitioners and buyers
Pt. 3 of our runtime reachability series uncovers the different types of runtime reachability
Unpacking Runtime Cloud Security in 2025, explaining CADR with use cases, and more
Featuring: * Rami McCarthy @ Wiz * Shay Berkovich @ Wiz * Charrah Hardamon @ Miggo * James Berthoty @ Latio In this conversation, we discuss the TJ Actions incident, a significant supply chain vulnerability affecting GitHub Actions. They explore the implications of a single maintainer's code being widely used, the community's response to
This post covers what code to cloud is, if it's important, and why it should matter
Cloud Runtime Security