
Blog
Qix NPM Supply Chain Attack: What Teams Need to Know
Responder Resources
James has worked across most areas of the security industry - from IT, to DevOps to security operations. He created Latio as a resource for engineers to find the best security tools for their environment.
Blog
Responder Resources
0:00 /0:15 1× Over the last few months, we’ve seen an onslaught of AI Security acquisitions - all at strong margins for investors. One might look at these and think they’re all the same, but each actually tells a slightly different story. We just published an
Report
Bringing clarity to the marketing madhouse
Product Reviews
An honest product review on Sweet Security highlighting the the pros and cons of their platform
Podcast
Explaining what containers are and aren't, and how to use them
Podcast
Date: May 12, 2025 Guest: Daniel Pacak (Software Engineer, Miggo) Hosts: James Berthoty, Charrah Hardamon Topic: Building Real Runtime Security with eBPF In this episode, we go deep on eBPF and what it actually takes to build reliable, performant runtime detection, beyond the buzzwords. James and Charrah are joined by
Blog
The key takeaways after attending RSAC 2025 for practitioners and buyers
Blog
Pt. 3 of our runtime reachability series uncovers the different types of runtime reachability
Blog
Unpacking Runtime Cloud Security in 2025, explaining CADR with use cases, and more
Podcast
Featuring: * Rami McCarthy @ Wiz * Shay Berkovich @ Wiz * Charrah Hardamon @ Miggo * James Berthoty @ Latio In this conversation, we discuss the TJ Actions incident, a significant supply chain vulnerability affecting GitHub Actions. They explore the implications of a single maintainer's code being widely used, the community's response to
Blog
This post covers what code to cloud is, if it's important, and why it should matter
Podcast
Cloud Runtime Security