Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

How to Build an NPM Package for ESM and CJS

In this video, we show you how to build an NPM package that is compatible with ESM and CJS. Have you built an NPM package before? if so, share it down below in the comments! Snyk helps you find and fix vulnerabilities in your code, open-source dependencies, containers, infrastructure-as-code, software pipelines, IDEs, and more! Move fast, stay secure.

Navigating the Future: The Security Challenges of Delivery Robots

In today's rapidly evolving world, the rise of delivery robots is revolutionizing the way we think about logistics and convenience. But with great innovation comes great responsibility, especially when it comes to security. Join us at Brivo as we dive deep into the challenges and solutions surrounding the security of delivery robots.

Trust and Control in Third-Party Audits: Navigating the Challenges

This clip explores the delicate balance between trust and control in managing third-party vendors. With only large corporations often able to conduct thorough audits, many organisations must rely on paper audits and trust the provided responses. Understand the limitations and strategies for ensuring security when physical audits aren't feasible.

Sysdig's AI Workload Security

AI usage has exploded. In just a few years, it's gone from something the enterprise should track to a powerful technology set we rely on. This sharp rise has created a world of opportunity and a new set of security challenges that we need to be aware of, but not scared of. And that's why I'm excited to share our new AI workload security feature. By understanding where they are running, Sysdig helps you control shadow AI and active AI risk and keeps you ahead of emerging AI regulations because you'll know what AI workloads you have, where they are, and what risks are associated with them.

The 443 Podcast - Episode 292 - SSID Confusion Attacks

This week on the podcast, we cover a newly disclosed weakness in the 802.11 Wi-Fi standard that affects common enterprise Wi-Fi deployments. Before that, we discuss CISA's Secure by Design Pledge for technology vendors before ending with a Microsoft research post on Quick Assist social engineering. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.