
Qix NPM Supply Chain Attack: What Teams Need to Know
Responder Resources
Responder Resources
0:00 /0:15 1× Over the last few months, we’ve seen an onslaught of AI Security acquisitions - all at strong margins for investors. One might look at these and think they’re all the same, but each actually tells a slightly different story. We just published an
Bringing clarity to the marketing madhouse
An honest product review on Sweet Security highlighting the the pros and cons of their platform
Explaining what containers are and aren't, and how to use them
Date: May 12, 2025 Guest: Daniel Pacak (Software Engineer, Miggo) Hosts: James Berthoty, Charrah Hardamon Topic: Building Real Runtime Security with eBPF In this episode, we go deep on eBPF and what it actually takes to build reliable, performant runtime detection, beyond the buzzwords. James and Charrah are joined by
The key takeaways after attending RSAC 2025 for practitioners and buyers
Pt. 3 of our runtime reachability series uncovers the different types of runtime reachability
Unpacking Runtime Cloud Security in 2025, explaining CADR with use cases, and more
Featuring: * Rami McCarthy @ Wiz * Shay Berkovich @ Wiz * Charrah Hardamon @ Miggo * James Berthoty @ Latio In this conversation, we discuss the TJ Actions incident, a significant supply chain vulnerability affecting GitHub Actions. They explore the implications of a single maintainer's code being widely used, the community's response to
This post covers what code to cloud is, if it's important, and why it should matter
Cloud Runtime Security
Market Reports
In this blog, we give a nuanced perspective on Google’s 32 billion dollar Wiz acquisition - one that clearly communicates who wins and loses
Market Reports
Three things GitHub could do to vastly improve security capabilities
Market Reports
Another reason runtime security is so important, and patching ain't what it seems
Market Reports
In this article, we discuss Check Point and Palo’s transitions are an acknowledgement that the fight for the “posture” side of CNAPP is are over
Report
Evaluating the AI AppSec Engineering Hype
Blog
And the importance of a commoditized SAST
Blog
An early preview of Wiz Defend, and the next 5 years of runtime focused CNAPP
Blog
Part 2 of our reachability 3 part series explores the pros and cons of two emerging types of reachability
Technical Guides
A helpful guide to help teams understand what goes into choosing what to fix and when
Technical Guides
Explaining the use cases and how to implement an under-discussed Kubernetes feature
Product Reviews
Answering my most received question from the last 2 weeks
Resources and analysis on the latest zero days: CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177