<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Latio Pulse]]></title><description><![CDATA[Weekly insights into Cloud, Application & Product Security]]></description><link>https://pulse.latio.tech</link><image><url>https://substackcdn.com/image/fetch/$s_!2rF4!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a02ad8f-1d5a-46da-bf17-2a9deb3bf6c5_1024x1024.png</url><title>Latio Pulse</title><link>https://pulse.latio.tech</link></image><generator>Substack</generator><lastBuildDate>Mon, 20 Apr 2026 14:15:39 GMT</lastBuildDate><atom:link href="https://pulse.latio.tech/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[James Berthoty]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[latio@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[latio@substack.com]]></itunes:email><itunes:name><![CDATA[James Berthoty]]></itunes:name></itunes:owner><itunes:author><![CDATA[James Berthoty]]></itunes:author><googleplay:owner><![CDATA[latio@substack.com]]></googleplay:owner><googleplay:email><![CDATA[latio@substack.com]]></googleplay:email><googleplay:author><![CDATA[James Berthoty]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[AI Code Security: Enterprise Governance for AI Generated Code]]></title><description><![CDATA[How AI is changing the code security process]]></description><link>https://pulse.latio.tech/p/ai-code-security-enterprise-governance</link><guid isPermaLink="false">https://pulse.latio.tech/p/ai-code-security-enterprise-governance</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Tue, 07 Apr 2026 12:56:43 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/8230393d-a332-47b0-8263-ba5344835a5a_1200x1200.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>AI code generating agents like Claude Code and Codex have changed how code is written, unlocking new opportunities and risks for businesses. Security teams are currently investing in two different areas: securing AI generated code and security for AI agents across their workforce. Most tools specialize in one or the other, with application security oriented tools focusing on secure code generation, and AI security tools focusing on securing agents themselves.</p><p>Over the next few years, several existing and emerging application security capabilities will converge into a single category: <strong>AI Code Security</strong>. This new category will be designed by a set of technologies that will define the future of application security.</p><p>This category is future-oriented: no single vendor does all of it today, but everyone is building towards it. AI code generation represents a third wave of development workflows - from waterfall to agile to AI-driven - and every major shift in how developers work creates an opportunity to reinvent how security is delivered. The outcomes stay the same: secure code and patching, but the workflows and underlying technologies change completely.</p><h1>What is AI Code Security</h1><p>AI Code Security is a category for solutions that provide AI coding agents with tailored security and business context to generate secure code, while giving security teams visibility, findings, and guardrails across their code base. The category will combine several emerging products: continuous threat modeling and design review, developer MDM, AI code review, AI SAST, and AI pentesting.</p><p>Rather than being rooted in a fear of AI generated code, this category takes advantage of the opportunities AI presents, completing the vision of shift left by automatically remediating vulnerabilities while shipping more secure code.</p><h1>The Current Approach Won&#8217;t Scale</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!A3iy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34191d62-6b16-4bff-afcc-05748cdd0c11_1600x884.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!A3iy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34191d62-6b16-4bff-afcc-05748cdd0c11_1600x884.png 424w, https://substackcdn.com/image/fetch/$s_!A3iy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34191d62-6b16-4bff-afcc-05748cdd0c11_1600x884.png 848w, https://substackcdn.com/image/fetch/$s_!A3iy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34191d62-6b16-4bff-afcc-05748cdd0c11_1600x884.png 1272w, https://substackcdn.com/image/fetch/$s_!A3iy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34191d62-6b16-4bff-afcc-05748cdd0c11_1600x884.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!A3iy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34191d62-6b16-4bff-afcc-05748cdd0c11_1600x884.png" width="1456" height="804" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/34191d62-6b16-4bff-afcc-05748cdd0c11_1600x884.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:804,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!A3iy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34191d62-6b16-4bff-afcc-05748cdd0c11_1600x884.png 424w, https://substackcdn.com/image/fetch/$s_!A3iy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34191d62-6b16-4bff-afcc-05748cdd0c11_1600x884.png 848w, https://substackcdn.com/image/fetch/$s_!A3iy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34191d62-6b16-4bff-afcc-05748cdd0c11_1600x884.png 1272w, https://substackcdn.com/image/fetch/$s_!A3iy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34191d62-6b16-4bff-afcc-05748cdd0c11_1600x884.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Current scanning approach with agentic workflows -<a href="https://link.excalidraw.com/l/6qFzFKIJXdd/5w6xzSpH1FI">https://link.excalidraw.com/l/6qFzFKIJXdd/5w6xzSpH1FI</a></figcaption></figure></div><p>Current application security scanning platforms have focused on building scanners that can run in the pipeline, and provide feedback to developers as quickly as possible. These platforms enabled the &#8220;shift left movement&#8221; by promising to stop vulnerabilities before they were deployed.</p><p>The wave of shift-left solutions face several fundamental challenges that go deeper than &#8220;too many false positives:&#8221;</p><ol><li><p>Vulnerabilities are discovered over time, and can&#8217;t be made &#8220;secure by default&#8221; - patching is the bottleneck, not discovery</p></li><li><p>No amount of secure developer training or code scans can force secure coding patterns</p></li><li><p>Architectural complexity and developer velocity make design review unscalable</p></li><li><p>Business logic exploits are the most common exploit types, but cannot be detected by deterministic scanning</p></li></ol><p>These challenges are due to two bottlenecks traditional tools have had: a lack of business context, and the complexity of the scanning workflow. First, traditional tools have failed to suggest contextual findings and fixes to your organization. Tools can find a SQL injection, but they can&#8217;t tell you what ORM you should use to fix it, or the risk of deploying that fix in the first place. Second, the workflow of traditional tools is built for humans, not AI. Shifting left makes security place speed bumps in front of developers, <strong>but AI agents need the feedback before they start coding, not after</strong>.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kEbo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa3ecbbd-da37-43de-8800-67b86fb5133a_1600x830.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kEbo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa3ecbbd-da37-43de-8800-67b86fb5133a_1600x830.png 424w, https://substackcdn.com/image/fetch/$s_!kEbo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa3ecbbd-da37-43de-8800-67b86fb5133a_1600x830.png 848w, https://substackcdn.com/image/fetch/$s_!kEbo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa3ecbbd-da37-43de-8800-67b86fb5133a_1600x830.png 1272w, https://substackcdn.com/image/fetch/$s_!kEbo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa3ecbbd-da37-43de-8800-67b86fb5133a_1600x830.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kEbo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa3ecbbd-da37-43de-8800-67b86fb5133a_1600x830.png" width="1456" height="755" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fa3ecbbd-da37-43de-8800-67b86fb5133a_1600x830.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:755,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kEbo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa3ecbbd-da37-43de-8800-67b86fb5133a_1600x830.png 424w, https://substackcdn.com/image/fetch/$s_!kEbo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa3ecbbd-da37-43de-8800-67b86fb5133a_1600x830.png 848w, https://substackcdn.com/image/fetch/$s_!kEbo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa3ecbbd-da37-43de-8800-67b86fb5133a_1600x830.png 1272w, https://substackcdn.com/image/fetch/$s_!kEbo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa3ecbbd-da37-43de-8800-67b86fb5133a_1600x830.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>AI Code Security tools focus on maximizing the value of AI Code Generation for Security teams, rather than the risks of using them. They&#8217;ll focus on providing teams with guidance on how to fix their security issues, while giving prescriptive advice for security agents. The result is improved remediation workflows, stronger code generation, and a more effective realization of shift-left principles, reducing vulnerability backlogs while giving security teams the oversight they need.</p><h1>How AI Code Security Works and Why It&#8217;s Needed</h1><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OLzV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fced252-0df9-41fa-a779-ffd187b94909_2048x478.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OLzV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fced252-0df9-41fa-a779-ffd187b94909_2048x478.png 424w, https://substackcdn.com/image/fetch/$s_!OLzV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fced252-0df9-41fa-a779-ffd187b94909_2048x478.png 848w, https://substackcdn.com/image/fetch/$s_!OLzV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fced252-0df9-41fa-a779-ffd187b94909_2048x478.png 1272w, https://substackcdn.com/image/fetch/$s_!OLzV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fced252-0df9-41fa-a779-ffd187b94909_2048x478.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OLzV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fced252-0df9-41fa-a779-ffd187b94909_2048x478.png" width="1456" height="340" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7fced252-0df9-41fa-a779-ffd187b94909_2048x478.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:340,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OLzV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fced252-0df9-41fa-a779-ffd187b94909_2048x478.png 424w, https://substackcdn.com/image/fetch/$s_!OLzV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fced252-0df9-41fa-a779-ffd187b94909_2048x478.png 848w, https://substackcdn.com/image/fetch/$s_!OLzV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fced252-0df9-41fa-a779-ffd187b94909_2048x478.png 1272w, https://substackcdn.com/image/fetch/$s_!OLzV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fced252-0df9-41fa-a779-ffd187b94909_2048x478.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Emerging AI scanning categories - <a href="https://link.excalidraw.com/l/6qFzFKIJXdd/5w6xzSpH1FI">https://link.excalidraw.com/l/6qFzFKIJXdd/5w6xzSpH1FI</a></figcaption></figure></div><p>With the right contextual guidance, AI code generation enables two primary opportunities: first, <strong>the effective remediation of backlogs</strong>, and second, <strong>secure by default code generation</strong>. The first addresses the challenge of getting organizational buy-in to fix security issues. The second addresses the challenge of building and enforcing security standards unique to your organization.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NdmB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52d7648-5939-4bc3-b40c-fbe8e47fe861_1892x982.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NdmB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52d7648-5939-4bc3-b40c-fbe8e47fe861_1892x982.png 424w, https://substackcdn.com/image/fetch/$s_!NdmB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52d7648-5939-4bc3-b40c-fbe8e47fe861_1892x982.png 848w, https://substackcdn.com/image/fetch/$s_!NdmB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52d7648-5939-4bc3-b40c-fbe8e47fe861_1892x982.png 1272w, https://substackcdn.com/image/fetch/$s_!NdmB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52d7648-5939-4bc3-b40c-fbe8e47fe861_1892x982.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NdmB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52d7648-5939-4bc3-b40c-fbe8e47fe861_1892x982.png" width="1456" height="756" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b52d7648-5939-4bc3-b40c-fbe8e47fe861_1892x982.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:756,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:159071,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/193395808?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52d7648-5939-4bc3-b40c-fbe8e47fe861_1892x982.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NdmB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52d7648-5939-4bc3-b40c-fbe8e47fe861_1892x982.png 424w, https://substackcdn.com/image/fetch/$s_!NdmB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52d7648-5939-4bc3-b40c-fbe8e47fe861_1892x982.png 848w, https://substackcdn.com/image/fetch/$s_!NdmB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52d7648-5939-4bc3-b40c-fbe8e47fe861_1892x982.png 1272w, https://substackcdn.com/image/fetch/$s_!NdmB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52d7648-5939-4bc3-b40c-fbe8e47fe861_1892x982.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>AI Code Security solutions begin by analyzing your attack surface, code, and knowledge bases to build a contextual knowledge graph of your product, its goals, and architecture. This contextual graph is the underpinnings of the outcomes these solutions deliver: threat models, contextual security findings, and secure code generation. This knowledge graph is only possible thanks to AI&#8217;s abilities to parse contextual data, making the entire security process customized to your organization. Building and enforcing this knowledge graph requires the following four core technologies: threat modeling, AI AST, interactive review tools, and developer MDMs.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hEvu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F591d071e-65c9-4bf2-b2a0-035944239cd7_2048x586.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hEvu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F591d071e-65c9-4bf2-b2a0-035944239cd7_2048x586.png 424w, https://substackcdn.com/image/fetch/$s_!hEvu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F591d071e-65c9-4bf2-b2a0-035944239cd7_2048x586.png 848w, https://substackcdn.com/image/fetch/$s_!hEvu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F591d071e-65c9-4bf2-b2a0-035944239cd7_2048x586.png 1272w, https://substackcdn.com/image/fetch/$s_!hEvu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F591d071e-65c9-4bf2-b2a0-035944239cd7_2048x586.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hEvu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F591d071e-65c9-4bf2-b2a0-035944239cd7_2048x586.png" width="1456" height="417" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/591d071e-65c9-4bf2-b2a0-035944239cd7_2048x586.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:417,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hEvu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F591d071e-65c9-4bf2-b2a0-035944239cd7_2048x586.png 424w, https://substackcdn.com/image/fetch/$s_!hEvu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F591d071e-65c9-4bf2-b2a0-035944239cd7_2048x586.png 848w, https://substackcdn.com/image/fetch/$s_!hEvu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F591d071e-65c9-4bf2-b2a0-035944239cd7_2048x586.png 1272w, https://substackcdn.com/image/fetch/$s_!hEvu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F591d071e-65c9-4bf2-b2a0-035944239cd7_2048x586.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Components of a code security context graph</figcaption></figure></div><p>First, threat modelling and design review are the foundation of security, but oftentimes treated as luxury investments. AI enables continuous review and enforcement by integrating with a company&#8217;s existing documentation to give teams insights into potential threats, while providing guidance on what policies to implement to prevent them. For example, AI Threat Modeling and Design Review tools give teams not just necessary documentation, but <strong>guidance on what secure coding practices they need to implement.</strong></p><p>Second, AI is transforming traditional scanning capabilities - from SAST to DAST. AI native SAST tools provide a generational improvement over traditional SAST by using contextual graphs to discover novel findings across a code base, and suggest remediations. While this outcome is the closest to existing scanners, the findings themselves are categorically different - discovering unique logic vulnerabilities, while reducing false positives based on holistic application contexts. These capabilities are found across three emerging categories, none of which are all done by a single vendor: AI SAST, SCA autopatching, reachability analysis, and AI Pentesting. While threat modelling provides proactive guidance, AI testing provides the backlog and vulnerability contexts.</p><p>Third, the way that teams are interacting with their tools is changing from static scan results in PRs, to <strong>interactive chat experiences with coding tools</strong>. Security tools are evolving to fix their own issues without interfering with developer experiences by handing the work over to a background agent. Furthermore, teams are looking for ongoing and automatic guidance around their coding decisions, and what features to implement.</p><p>Finally, teams need a way to deploy and enforce these secure coding guidelines. We wrote earlier about the <a href="https://pulse.latio.tech/p/developer-mdm">emerging capabilities of Developer MDMs</a>, which allow the enforcement of AI coding standards as a side effect of providing broader governance of developer endpoints. Teams need the ability to govern developer endpoints, while enforcing their security rules to generate secure code.</p><p>When these capabilities are combined, teams get an end to end solution for securing AI generated code:</p><ol><li><p>A <strong>threat model is generated specific to your organization</strong> and application</p></li><li><p>AI testing <strong>discovers and validates existing issues</strong>, while continuously assessing new deployments</p></li><li><p>Agents automatically gather security context when applicable to their task to<strong> improve and standardize code</strong></p></li></ol><p><strong>Why This Matters for Security Leaders</strong></p><p>Executive leadership is pushing for AI adoption, but security is still expected to govern the adoption. Teams need new capabilities to adopt and enforce standards as fast as AI code generation is happening. Security teams need governance capabilities for safe AI adoption.</p><p><strong>Why this is Important for Practitioners</strong></p><p>Practitioners are stuck using an outdated model of scanning, creating developer friction rather than adopting the new possibilities AI enables. In the long run, this new category of tools will make security&#8217;s job easier, not harder. AI Code Security tools will give teams more time to focus on higher level architecture research rather than prioritization and remediation.</p><h2>Capabilities Guiding the AI Code Security Market</h2><p><strong>Build your own AI Code Security</strong></p><p>Many security teams have already begun rolling their own versions of pieces of this solution:</p><ol><li><p>Create a centralized repository for security use cases and best practices, giving developers guidance on what tools and techniques are used.</p></li><li><p>Complete threat models and design reviews on ongoing projects, and update existing documentation accordingly.</p></li><li><p>Give this context to your coding agent of choice in the way that best utilizes the context window. This might mean rules files, skills, MCPs, or a combination of approaches.</p></li></ol><p><strong>Continuous threat modelling and design review vendors</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kyVW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F404a2efd-3690-44ed-8f2f-3bb5153133b6_1600x376.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kyVW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F404a2efd-3690-44ed-8f2f-3bb5153133b6_1600x376.png 424w, https://substackcdn.com/image/fetch/$s_!kyVW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F404a2efd-3690-44ed-8f2f-3bb5153133b6_1600x376.png 848w, https://substackcdn.com/image/fetch/$s_!kyVW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F404a2efd-3690-44ed-8f2f-3bb5153133b6_1600x376.png 1272w, https://substackcdn.com/image/fetch/$s_!kyVW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F404a2efd-3690-44ed-8f2f-3bb5153133b6_1600x376.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kyVW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F404a2efd-3690-44ed-8f2f-3bb5153133b6_1600x376.png" width="1456" height="342" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/404a2efd-3690-44ed-8f2f-3bb5153133b6_1600x376.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:342,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kyVW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F404a2efd-3690-44ed-8f2f-3bb5153133b6_1600x376.png 424w, https://substackcdn.com/image/fetch/$s_!kyVW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F404a2efd-3690-44ed-8f2f-3bb5153133b6_1600x376.png 848w, https://substackcdn.com/image/fetch/$s_!kyVW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F404a2efd-3690-44ed-8f2f-3bb5153133b6_1600x376.png 1272w, https://substackcdn.com/image/fetch/$s_!kyVW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F404a2efd-3690-44ed-8f2f-3bb5153133b6_1600x376.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Vendors in this category connect to your code and knowledge bases to create an ongoing threat model of your environment. They can then provide AI generated design reviews for upcoming changes, as well as flagging major changes that are in progress. Leaders in this emerging category also offer in pipeline enforcement to make sure defined security standards are being enforced. Startups in this category are <a href="https://clover.security/">Clover</a>, <a href="https://www.primesec.ai/">Prime</a>, <a href="https://seezo.io/">Seezo</a>, and <a href="https://www.devarmor.com/">Devarmor</a>.</p><p><strong>AI SAST and AI Pentesting</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6S3G!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F045e922b-99d3-414b-8fcf-30d4fe368196_1419x737.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6S3G!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F045e922b-99d3-414b-8fcf-30d4fe368196_1419x737.png 424w, https://substackcdn.com/image/fetch/$s_!6S3G!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F045e922b-99d3-414b-8fcf-30d4fe368196_1419x737.png 848w, https://substackcdn.com/image/fetch/$s_!6S3G!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F045e922b-99d3-414b-8fcf-30d4fe368196_1419x737.png 1272w, https://substackcdn.com/image/fetch/$s_!6S3G!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F045e922b-99d3-414b-8fcf-30d4fe368196_1419x737.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6S3G!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F045e922b-99d3-414b-8fcf-30d4fe368196_1419x737.png" width="1419" height="737" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/045e922b-99d3-414b-8fcf-30d4fe368196_1419x737.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:737,&quot;width&quot;:1419,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:98247,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/193395808?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F045e922b-99d3-414b-8fcf-30d4fe368196_1419x737.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6S3G!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F045e922b-99d3-414b-8fcf-30d4fe368196_1419x737.png 424w, https://substackcdn.com/image/fetch/$s_!6S3G!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F045e922b-99d3-414b-8fcf-30d4fe368196_1419x737.png 848w, https://substackcdn.com/image/fetch/$s_!6S3G!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F045e922b-99d3-414b-8fcf-30d4fe368196_1419x737.png 1272w, https://substackcdn.com/image/fetch/$s_!6S3G!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F045e922b-99d3-414b-8fcf-30d4fe368196_1419x737.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the application security report we highlighted all of the vendors associated with AI SAST and AI Pentesting; however, we didn&#8217;t fully break out the AI methodologies taken by these companies. In this context, the AI Native SAST approach that uses LLMs to explore tagged syntax trees is most relevant. Providers that we know work this way are <a href="https://zeropath.com/">Zeropath</a>, <a href="https://aisle.com/">Aisle</a>, <a href="https://depthfirst.com/">Depthfirst</a>, and <a href="https://corgea.com/">Corgea</a> - this distinction is important because it benefits from the data imported from the threat model.</p><p><strong>Agentic Code Security Management</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tLuJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8e6ee13-ef5f-422f-8564-16f9efdf5198_1600x1126.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tLuJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8e6ee13-ef5f-422f-8564-16f9efdf5198_1600x1126.png 424w, https://substackcdn.com/image/fetch/$s_!tLuJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8e6ee13-ef5f-422f-8564-16f9efdf5198_1600x1126.png 848w, https://substackcdn.com/image/fetch/$s_!tLuJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8e6ee13-ef5f-422f-8564-16f9efdf5198_1600x1126.png 1272w, https://substackcdn.com/image/fetch/$s_!tLuJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8e6ee13-ef5f-422f-8564-16f9efdf5198_1600x1126.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tLuJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8e6ee13-ef5f-422f-8564-16f9efdf5198_1600x1126.png" width="1456" height="1025" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a8e6ee13-ef5f-422f-8564-16f9efdf5198_1600x1126.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1025,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tLuJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8e6ee13-ef5f-422f-8564-16f9efdf5198_1600x1126.png 424w, https://substackcdn.com/image/fetch/$s_!tLuJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8e6ee13-ef5f-422f-8564-16f9efdf5198_1600x1126.png 848w, https://substackcdn.com/image/fetch/$s_!tLuJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8e6ee13-ef5f-422f-8564-16f9efdf5198_1600x1126.png 1272w, https://substackcdn.com/image/fetch/$s_!tLuJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8e6ee13-ef5f-422f-8564-16f9efdf5198_1600x1126.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When it comes to enforcing coding standards, there are two general capabilities:</p><ol><li><p>Fetching organizational context to the agent without disrupting its workflows. <a href="https://www.corridor.dev/">Corridor</a> specializes in this approach, but we&#8217;ve also seen less sophisticated versions from other vendors.</p></li></ol><ol start="2"><li><p>Governing permitted AI coding tools on developer endpoints. <a href="https://www.backslash.security/">Backslash</a> is the most mature version of this we&#8217;ve seen, but several larger application security platforms such as <a href="https://evo.ai.snyk.io/">Snyk</a>, <a href="https://www.ox.security/">Ox</a>, <a href="https://www.pillar.security/">Pillar</a> and <a href="https://www.legitsecurity.com/">Legit</a> provide versions of these capabilities.</p></li></ol><p>These capabilities provide both the endpoint and agent governance teams need to enforce the context created by the other tools.</p><h1>Conclusion</h1><p>This article focuses on the future requirements of the market and how a new category, AI Code Security will be built to deliver the solution. There are several emerging products that help secure AI generated code, but we&#8217;re excited to see all of the components get put together. Our prediction is that there will be a new multi-billion dollar application security company, and it will be the one that best puts all of these pieces together.</p>]]></content:encoded></item><item><title><![CDATA[The Complete Guide to Preventing Open Source Malware]]></title><description><![CDATA[Prevent open source malware with Latio&#8217;s complete guide, including checklists and a Claude Code plugin.]]></description><link>https://pulse.latio.tech/p/the-complete-guide-to-preventing</link><guid isPermaLink="false">https://pulse.latio.tech/p/the-complete-guide-to-preventing</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Tue, 31 Mar 2026 12:55:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!FLnn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2542b8b9-2aaf-4e90-aa62-f30c2c6d6277_744x461.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FLnn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2542b8b9-2aaf-4e90-aa62-f30c2c6d6277_744x461.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FLnn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2542b8b9-2aaf-4e90-aa62-f30c2c6d6277_744x461.png 424w, https://substackcdn.com/image/fetch/$s_!FLnn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2542b8b9-2aaf-4e90-aa62-f30c2c6d6277_744x461.png 848w, https://substackcdn.com/image/fetch/$s_!FLnn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2542b8b9-2aaf-4e90-aa62-f30c2c6d6277_744x461.png 1272w, https://substackcdn.com/image/fetch/$s_!FLnn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2542b8b9-2aaf-4e90-aa62-f30c2c6d6277_744x461.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FLnn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2542b8b9-2aaf-4e90-aa62-f30c2c6d6277_744x461.png" width="744" height="461" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2542b8b9-2aaf-4e90-aa62-f30c2c6d6277_744x461.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:461,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:95138,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/192645035?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2542b8b9-2aaf-4e90-aa62-f30c2c6d6277_744x461.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FLnn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2542b8b9-2aaf-4e90-aa62-f30c2c6d6277_744x461.png 424w, https://substackcdn.com/image/fetch/$s_!FLnn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2542b8b9-2aaf-4e90-aa62-f30c2c6d6277_744x461.png 848w, https://substackcdn.com/image/fetch/$s_!FLnn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2542b8b9-2aaf-4e90-aa62-f30c2c6d6277_744x461.png 1272w, https://substackcdn.com/image/fetch/$s_!FLnn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2542b8b9-2aaf-4e90-aa62-f30c2c6d6277_744x461.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It&#8217;s clear open source malware can no longer be overlooked. Last year, Sonatype cataloged over 877,000 known malicious packages across npm, PyPI, Maven, and other registries. This year, the number of packages being pushed to open source repositories has increased to over 100,000 a day, overwhelming scanners and researchers trying to keep up with the amount of malware being distributed. Most recently, the TeamPCP incidents, beginning with the Trivy takeover, showed how unprepared teams are to respond.</p><p>Security teams are prioritizing the structure of their application security programs around vulnerabilities, ignoring the impact, reach, and unique risks malware introduces. This creates a clear path to risk blind spots because <strong>CVE scanning doesn&#8217;t catch active exploits</strong>. Image scanning doesn&#8217;t catch compromised build pipelines, and most teams don&#8217;t audit their GitHub Actions, Terraform modules, VS Code extensions, or ML models. The attack surface is larger than most teams realize.</p><p>This guide provides teams with everything they need to understand and respond to open source malware:</p><ol><li><p>Six checklists to prevent malware across third-party packages, container images, Github actions, IaC modules, and AI models.</p></li><li><p>A <a href="https://github.com/latiotech/secure-supply-chain-skills">Claude Code plugin</a> to automate your discovery and remediation of these issues across your codebase.</p></li><li><p>An overview of common attack types per exploit category</p></li><li><p>A maturity matrix to assess your program&#8217;s readiness</p></li><li><p>Relevant OSS, freemium, and paid tools</p></li><li><p>Helpful resources for further reading</p></li></ol><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://pulse.latio.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://pulse.latio.tech/subscribe?"><span>Subscribe now</span></a></p><h1>How the Checklists Work</h1><p>The below six checklists provide suggestions for immediate and long-term strategies for preventing open source malware in an organization&#8217;s environment. The &#8220;Immediate Action&#8221; sections indicate high priority items that drastically reduce your attack surface. The &#8220;Long-term Initiatives&#8221; sections are larger engineering projects that are best practices for defense-in-depth initiatives. These checklists are also available as a <a href="https://github.com/latiotech/secure-supply-chain-skills">Claude Code plugin</a>. Just install the plugin and run /audit-supply-chain and it will identify and fix immediate issues, while providing walkthroughs for more complicated ones, alongside a complete report on the repo.</p><p>By starting with the checklists and Claude Code plugin, teams can take immediate action to safeguard their CI/CD pipelines from ongoing attacks. The longer term strategies provide what&#8217;s needed to mature your security program with defense in depth measures to validate the code that runs on your systems.</p><h2>Checklist for Third-Party Packages</h2><p>Many teams scan their third party packages for vulnerabilities, but often miss the preventative steps required to block malicious code from getting installed during updates. This checklist starts with steps to reduce your attack surface, and moves to active validation and prevention measures.</p><h3>Immediate Actions</h3><ul><li><p><strong>Pin all dependencies to specific versions </strong>- example: requests==2.31.0 instead of requests&gt;=2.0.0</p></li><li><p><strong>Require a package cooldown period</strong> on your builds, <a href="https://pnpm.io/supply-chain-security">pnpm security docs</a> as an example. <a href="https://github.com/lirantal/npm-security-best-practices">NPM security guide</a>.</p></li><li><p><strong>Disable pre-install and post-install scripts</strong> in your package manager - different package managers have different equivalents. Malware is commonly deployed during package installation.</p></li></ul><h3>Larger Initiatives</h3><ul><li><p><strong>Review every new dependency addition for health</strong> in PRs before merging -<a href="https://snyk.io/advisor/"> Snyk Advisor</a>, <a href="https://socket.dev/npm/package/lodash">Socket package lookup</a></p></li><li><p><strong>Deploy a malware scanner</strong> locally and in CI/CD that blocks on detection -<a href="https://github.com/AikidoSec/safe-chain"> Aikido SafeChain</a>,<a href="https://github.com/DataDog/guarddog"> GuardDog</a>, <a href="https://opensourcemalware.com/">OpenSource Malware</a></p></li><li><p><strong>Enable namespace/scope restrictions</strong> to prevent dependency confusion - <a href="https://docs.jfrog.com/artifactory/docs/jfrog-artifactory">Artifactory</a>,<a href="https://help.cloudsmith.io/docs/create-a-repository"> Cloudsmith</a></p></li><li><p><strong>Enforce allow-lists</strong> for approved packages</p></li><li><p><strong>Verify package signatures before deploy </strong>-<a href="https://docs.sigstore.dev/about/overview/"> Sigstore</a></p></li><li><p><strong>Generate SBOMs</strong> for your dependency tree -<a href="https://cyclonedx.org/getting-started/"> CycloneDX</a>,<a href="https://github.com/anchore/syft"> Syft</a></p></li><li><p><strong>Run packages in sandboxed install environments</strong> to detect install-time behavior -<a href="https://docs.stepsecurity.io/harden-runner"> StepSecurity</a>, or <a href="https://pulse.latio.tech/p/wtf-is-cloud-application-detection">other eBPF/CADR sensors</a>.</p></li></ul><h2>Checklist for Container Images</h2><p>Container images are not as commonly exploited as third party packages, but the underlying risk exposure is similar. This checklist provides teams steps to go from proper version pinning to total image signing and validation before deployment.</p><h3>Immediate Actions</h3><ul><li><p><strong>Audit your images</strong>, ensure you&#8217;re using official or verified base images only -<a href="https://docs.docker.com/scout/"> Docker Scout</a>, <a href="https://github.com/anchore/grype">Grype</a></p></li><li><p><strong>Pin base images by digest</strong>, not just tag (FROM node:18<strong>@sha256</strong>:...). Renovate and Dependabot can do this automatically.</p></li><li><p><strong>Stop running containers as root</strong> -<a href="https://hadolint.github.io/hadolint/"> Hadolint</a></p></li><li><p><strong>Scan images for known vulnerabilities</strong> -<a href="https://github.com/anchore/grype"> Grype</a>,<a href="https://docs.docker.com/scout/"> Docker Scout</a></p></li></ul><h3>Larger Initiatives</h3><ul><li><p><strong>Implement image signing and verification</strong> to prevent tampering -<a href="https://docs.sigstore.dev/cosign/"> Cosign</a></p></li><li><p><strong>Set up admission controllers</strong> to block unsigned or unscanned images -<a href="https://kyverno.io/"> Kyverno</a></p></li><li><p><strong>Scan images continuously in the registry</strong>, not just at build time -<a href="https://goharbor.io/"> Harbor</a>,<a href="https://github.com/goodwithtech/dockle"> Dockle</a></p></li><li><p><strong>Automate weekly rebuilds</strong> of base images</p></li><li><p><strong>Switch to minimal base images, and/or use multi-step builds</strong> -<a href="https://hub.docker.com/_/alpine"> Alpine</a>,<a href="https://github.com/GoogleContainerTools/distroless"> Distroless</a></p></li><li><p><strong>Build images in hermetic, reproducible environments</strong></p></li><li><p><strong>Generate and attach SBOMs and SLSA provenance attestations</strong> to every image -<a href="https://slsa.dev/"> SLSA</a>,<a href="https://in-toto.io/"> in-toto</a></p></li></ul><h2>Checklist for GitHub Actions</h2><p>Github actions are commonly misconfigured in public repos, allowing attackers to inject code via their own branches. This checklist provides teams guidance on preventing these attacks, as well as how to monitor them in the future.</p><h3>Immediate Actions</h3><ul><li><p><strong>Pin all Actions to full commit SHAs</strong> (not tags or branches) -<a href="https://github.com/mheap/pin-github-action"> pin-github-action</a></p></li><li><p><strong>Set permissions: explicitly</strong> in every <a href="https://docs.github.com/en/actions/reference/workflows-and-actions/workflow-syntax#permissions">workflow to least-privilege</a></p></li><li><p><strong>Use CODEOWNERS</strong> to require review on .github/workflows/ changes</p></li><li><p><strong>Audit which third-party Actions</strong> you&#8217;re currently using, and scan them for issues like pull_request_target triggers -<a href="https://github.com/zizmorcore/zizmor"> Zizmor</a></p></li><li><p><strong>Enable tag protection rules </strong>- create a ruleset to prevent forced tag releases</p></li><li><p><strong>Don&#8217;t allow untrusted input to AI tools in pipeline</strong> - ensure that input from Github issues or other public sources doesn&#8217;t run in combination with AI review tools.</p></li></ul><h3>Larger Initiatives</h3><ul><li><p><strong>Enable GitHub&#8217;s Action allow-list</strong> to restrict <a href="https://docs.github.com/en/organizations/managing-organization-settings/disabling-or-limiting-github-actions-for-your-organization">which Actions can run</a></p></li><li><p><strong>Monitor network egress and filesystem activity</strong> in workflows -<a href="https://docs.stepsecurity.io/harden-runner"> StepSecurity Harden Runner</a>, or other eBPF sensor.</p></li><li><p><strong>Use OpenSSF Scorecard</strong> to evaluate Action trustworthiness -<a href="https://scorecard.dev/"> OpenSSF Scorecard</a></p></li><li><p><strong>Implement OIDC for cloud deployments</strong> instead of long-lived secrets</p></li><li><p><strong>Separate CI and CD workflows</strong> with environment-based approvals</p></li><li><p><strong>Enforce SHA pinning at the org level</strong> via GitHub policy</p></li><li><p><strong>Run self-hosted runners in ephemeral, isolated environments</strong></p></li><li><p><strong>Build internal Action mirrors</strong> for critical dependencies</p></li><li><p><strong>Set up automated Action version updates</strong> -<a href="https://docs.github.com/en/code-security/tutorials/secure-your-dependencies/dependabot-quickstart-guide"> Dependabot</a>,<a href="https://docs.renovatebot.com/"> Renovate</a></p></li></ul><h2>Checklist for Infrastructure-as-Code Modules</h2><p>Infrastructure as code is an underexplored attack vector in open source malware, as gaining initial access is more challenging for attackers. A few basic actions can vastly improve your posture.</p><h3>Immediate Actions</h3><ul><li><p><strong>Pin Terraform modules and providers</strong> to exact versions - version = &#8220;5.1.2&#8221; instead of version = &#8220;&gt;= 3.0.0&#8221;</p></li><li><p><strong>Use only modules from the official verified registry</strong> or your org&#8217;s private registry</p></li><li><p><strong>Run IaC scanning</strong> for misconfigurations -<a href="https://www.checkov.io/"> Checkov</a>,<a href="https://github.com/terraform-linters/tflint"> tflint</a></p></li></ul><h3>Larger Initiatives</h3><ul><li><p><strong>Implement Terraform <a href="https://developer.hashicorp.com/terraform/language/manage-sensitive-data">state encryption</a></strong> and access controls</p></li><li><p><strong>Use OPA/Sentinel policies</strong> to enforce guardrails (no public S3 buckets, no wildcard IAM, etc.) -<a href="https://developer.hashicorp.com/sentinel/docs/concepts/language"> Sentinel</a>,<a href="https://www.openpolicyagent.org/"> OPA</a></p></li><li><p><strong>Enable drift detection</strong> to catch out-of-band changes -<a href="https://spacelift.io/"> Spacelift</a>,<a href="https://www.env0.com/"> env0</a></p></li><li><p><strong>Lock down local-exec and external provisioners </strong>and <strong>Run all IaC applies through audited CI runners</strong> -<a href="https://www.runatlantis.io/"> Atlantis</a>,<a href="https://developer.hashicorp.com/terraform/cloud-docs"> Terraform Cloud</a></p></li><li><p><strong>Require signed commits</strong> for IaC repos</p></li><li><p><strong>Build internal module libraries</strong> with security-reviewed defaults</p></li><li><p><strong>Continuously reconcile running infrastructure</strong> against declared state -<a href="https://www.crossplane.io/"> Crossplane</a>,<a href="https://www.firefly.ai/"> Firefly</a></p></li></ul><h2>Checklist for AI/ML Models</h2><p>This checklist applies to teams building or using open source models rather than third party providers like Anthropic or OpenAI. Numerous supply chain attacks target these ecosystems, as standards are less rigidly enforced.</p><h3>Immediate Actions</h3><ul><li><p><strong>Never load untrusted pickle files</strong></p></li><li><p><strong>Prefer safer serialization formats</strong> over pickle/PyTorch native -<a href="https://github.com/huggingface/safetensors"> SafeTensors</a>,<a href="https://onnx.ai/"> ONNX</a></p></li><li><p><strong>Only pull models from verified organizations</strong> on Hugging Face -<a href="https://huggingface.co/docs/hub/index"> Hugging Face Hub</a></p></li><li><p><strong>Document which models your team uses</strong> and where they come from</p></li></ul><h3>Larger Initiatives</h3><ul><li><p><strong>Run Picklescan on all PyTorch models</strong> before loading -<a href="https://github.com/mmaitre314/picklescan"> Picklescan</a>,<a href="https://github.com/protectai/modelscan"> ModelScan</a></p></li><li><p><strong>Host models in a private registry</strong> with access controls</p></li><li><p><strong>Verify model hashes</strong> against known-good checksums</p></li><li><p><strong>Implement model cards</strong> and provenance documentation</p></li><li><p><strong>Run all model loading in sandboxed environments</strong> with no network access</p></li><li><p><strong>Implement model signing and verification</strong></p></li><li><p><strong>Conduct adversarial testing</strong> to detect poisoned models</p></li><li><p><strong>Maintain an internal model registry</strong> with security review gates</p></li><li><p><strong>Monitor AI systems at runtime</strong> to spot malicious behavior</p></li></ul><h2>Checklist for IDE Extensions and Developer Tools</h2><p>This checklist targets protecting developer endpoints, which frequently run third party code in browser and VSCode extensions. Endpoint management tools are needed to audit what&#8217;s running across developer machines.</p><h3>Immediate Actions</h3><ul><li><p><strong>Audit currently installed extensions</strong> across your team -<a href="https://marketplace.visualstudio.com/vscode"> VS Code Marketplace</a>, <a href="https://santa.dev/">Santa</a>, <a href="https://osquery.io/">OSQuery</a></p></li><li><p><strong>Only install extensions from verified publishers</strong> with meaningful install counts -<a href="https://www.wiz.io/blog/supply-chain-risk-in-vscode-extension-marketplaces"> Wiz: VS Code Supply Chain Risk</a></p></li><li><p><strong>Remove unused extensions</strong></p></li><li><p><strong>Review extension permissions before installing</strong> (network access, filesystem access)</p></li><li><p><strong>Give developer training</strong> on extension usage and risks</p></li></ul><h3>Larger Initiatives</h3><ul><li><p><strong>Publish an org-approved extension allowlist</strong></p></li><li><p><strong>Use VS Code Profiles</strong> to standardize extensions across teams -<a href="https://code.visualstudio.com/docs/configure/profiles"> VS Code Profiles</a></p></li><li><p><strong>Restrict VS Code Marketplace access</strong> via enterprise policy</p></li><li><p><strong>Have a plan to rotate secrets</strong> that live on developer workstations</p></li><li><p><strong>Run dev environments in remote containers</strong> or cloud-based environments -<a href="https://docs.github.com/en/codespaces/overview"> GitHub Codespaces</a>,<a href="https://gitpod.io/"> Gitpod</a>,<a href="https://code.visualstudio.com/docs/devcontainers/containers"> Dev Containers</a></p></li><li><p><strong>Implement network segmentation</strong> for developer workstations</p></li><li><p><strong>Monitor extension behavior</strong> at the endpoint level</p></li><li><p><strong>Use ephemeral dev environments</strong> that reset between sessions</p></li></ul><h2>Examples of Open Source Malware Attacks</h2><h3>Attacks on Third-Party Packages</h3><p>This is the highest-volume attack surface, as public registries have little to no gatekeeping on who can publish what. Most developers don&#8217;t inspect the code of open source packages they&#8217;re importing into their code, and most organizations don&#8217;t follow a stringent approval process for adding new libraries. Additionally, trusted packages can become less well maintained over time, increasing the tech debt and attack surface over time.</p><p><strong>Example Attacks:</strong></p><p><strong>Typosquatting.</strong> Publishing packages with names one character off from popular libraries (reqeusts instead of requests, lodashs instead of lodash). Threat actors now use AI to mass-generate look-alike package names and obfuscate payloads to bypass signature-based scanners. The malicious packages mirror the real API, so developers don&#8217;t notice the mistake immediately. Install scripts run when npm install or pip install executes.</p><p><strong>Dependency confusion.</strong> Targeting organizations that use internal package names that are guessable or leaked by creating higher version public packages. Most package managers prefer the public, higher-versioned package over the internal one. <a href="https://snyk.io/blog/detect-prevent-dependency-confusion-attacks-npm-supply-chain-security/">Blog on prevention in NPM</a>.</p><p><strong>Starjacking.</strong> Open source registries don&#8217;t verify that a package&#8217;s linked GitHub repo actually belongs to the publisher. Attackers link their malicious packages to high-star Github repos to appear to be the legitimate package. This one is easy to miss if searching public registries instead of Github itself.</p><p><strong>Malicious install scripts &amp; lifecycle hooks.</strong> This is the actual payload delivery mechanism for most open source malware attacks. npm preinstall/postinstall scripts, Python setup.py with arbitrary code, Maven plugins that execute during build phases. Whether the attacker gets their package installed via typosquatting, confusion, social engineering, or a leaked credential, installing the package executes the script that steals credentials.</p><p><strong>Maintainer account takeover.</strong> Compromising an existing, trusted maintainer&#8217;s credentials or PAT and pushing a malicious update to a legitimate, widely-used package. This can lead to directly pushing a malicious package upstream, sneaking in malicious code in a fake commit, or publishing malicious actions.</p><h3>Attacks on Container Images</h3><p>Container images from Docker Hub and other public registries carry a similar risk profile, but require different mitigations. With container images, teams are pulling a much larger attack surface than a single package, and they&#8217;re harder to scan for smuggled malicious code than Github directly. Because most teams don&#8217;t enforce what&#8217;s allowed in their images, it can be easy to overlook a package that was smuggled in.</p><p><strong>How attacks work:</strong></p><p><strong>Poisoned base images.</strong> Attackers publish images with names similar to official ones (ngnix vs nginx) or compromise less-maintained &#8220;community&#8221; images.</p><p><strong>Embedded malware in layers.</strong> Container images are built in layers, and malicious content can be hidden in intermediate layers that aren&#8217;t obvious when inspecting the final image. A RUN curl | sh buried in a multi-stage build is easy to miss. Because layers are cached and shared, the malicious content persists across rebuilds that don&#8217;t change that specific layer. Additionally, many teams don&#8217;t baseline image behavior, making it easy to miss when malicious actions take place during build.</p><p><strong>Registry credential theft.</strong> The GhostAction attack in September 2025 exfiltrated 3,325 secrets from 817 repos. Stolen registry credentials allow attackers to push compromised images to legitimate repos without anyone noticing until runtime.</p><p><strong>Tag mutability.</strong> FROM node:18 doesn&#8217;t mean you&#8217;ll get the same image every time. Tags are mutable, meaning that the image behind the tag can be changed. Without pinning by digest (@sha256:...), your build is pulling whatever was last pushed to that tag. This is similar to the Github actions attacks - images need to be pinned to full SHAs.</p><h3>Attacks on GitHub Actions</h3><p>This is the attack category that continues to explode across Github, and it&#8217;s the one most teams are still underestimating. GitHub Actions run with access to your repository secrets, GITHUB_TOKEN, deployment credentials, and whatever else is in the workflow environment. Supply chain attacks targeting GitHub Actions have increased significantly in 2026.</p><p><strong>How attacks work:</strong></p><p><strong>Action compromise/tag mutation.</strong> The tj-actions/changed-files incident was a widespread example of this vector, where attackers compromised a dependency action (reviewdog/action-setup), which cascaded up to tj-actions. The injected payload dumped CI runner memory, exposing secrets from every repo using the action. The attack exploited the fact that GitHub Action tags are mutable, @v3 was pointed to a malicious commit - this is why Github actions need to be pinned to specific SHAs.</p><p><strong>Typosquatting action organizations.</strong> Orca researchers demonstrated this attack vector by registering 14 GitHub organizations with misspelled names of popular Action owners such as circelci, actons, google-github-actons. There&#8217;s no verification system preventing this. A workflow with a typo in uses: silently runs the attacker&#8217;s code.</p><p><strong>Script injection.</strong> Actions that use ${{ github.event }} context in run: blocks are vulnerable to injection. An attacker crafts a PR title or commit message containing shell commands that execute in your workflow. This gives arbitrary code execution without needing to compromise any Action.</p><p><strong>Overpermissive workflow tokens.</strong> Actions running with permissions: write-all or default broad GITHUB_TOKEN scopes give compromised actions far more access than they need. Combined with any of the above vectors, overly permissive tokens amplify the blast radius dramatically.</p><p><strong>Cascading dependency chains.</strong> GitHub Actions can depend on other Actions. The tj-actions compromise originated from reviewdog/action-setup, a transitive dependency most users didn&#8217;t know they were pulling in. There&#8217;s no built-in dependency graph for Actions, making this invisible for most teams.</p><p><strong>AI tools with untrusted sources. </strong>Aikido researchers demonstrated an attack with AI pipeline tools taking input from untrusted sources, such as reading Github issues to prioritize them. Researchers were able to prompt inject these tools via issues to uncover secrets.</p><h3>Attacks on Infrastructure-as-Code Modules</h3><p>IaC modules are a distinct attack surface because they execute with infrastructure-level permissions. A malicious Terraform module can provision resources in your cloud account, modify IAM policies, or open network paths.</p><p><strong>How attacks work:</strong></p><p><strong>Malicious Terraform modules.</strong> The Terraform Registry has the same lack of gatekeeping as npm. At NDC Oslo 2025, researchers gave a live demonstration of supply chain attacks on the Terraform Registry. HashiCorp acknowledges that &#8220;Terraform providers and modules used in configurations will have full access to variables and Terraform state&#8221; and cannot prevent malicious modules from exfiltrating sensitive data.</p><p><strong>local-exec and provisioner abuse.</strong> Terraform modules can use local-exec provisioners to execute arbitrary commands in the CI environment, or use the HTTP provider to exfiltrate values from state. State files often contain database passwords, API keys, and other secrets that persist across runs.</p><h3>Attacks on AI/ML Models</h3><p>This is the fastest-growing attack surface, and the one where security tooling is least mature. Loading a serialized ML model can execute arbitrary code and many data science teams aren&#8217;t thinking about this as a security risk.</p><p><strong>How attacks work:</strong></p><p><strong>Pickle deserialization attacks.</strong> Python&#8217;s pickle module is the default serialization format for many ML frameworks. Pickle allows arbitrary Python code execution during deserialization. Loading a malicious .pkl or PyTorch model file can drop a reverse shell, exfiltrate data, or install persistent backdoors. In February 2025, ReversingLabs discovered two malicious ML models on Hugging Face using this exact technique.</p><p><strong>The &#8220;NullifAI&#8221; evasion.</strong> Several security scanners exist to detect malicious actions in compressed modules; however, these have been bypassed using a combination of different compression algorithms, as well as various bypasses for picklescan.</p><p><strong>Model poisoning.</strong> Beyond outright malware, attackers can subtly modify model weights to introduce backdoors. The model can perform normally during certain activities, but be triggered later to take malicious actions.</p><h3>Attacks on IDE Extensions and Developer Tools</h3><p>IDE extensions run with full local filesystem and network access on developer workstations, which often hold SSH keys, cloud credentials, and package registry tokens.</p><p><strong>How attacks work:</strong></p><p><strong>Malicious extension publishing.</strong> The &#8220;prettier-vscode-plus&#8221; attack in November 2025 delivered a multi-stage malware chain through the official VS Code Marketplace, deploying the Anivia loader followed by OctoRAT (a full remote access trojan). Extension marketplaces are not typically scanned by security vendors or maintainers.</p><p><strong>Leaked publisher access tokens.</strong> Wiz Research identified over 100 cases of secret leakage by VS Code extension publishers, including leaked Personal Access Tokens (PATs) that grant the ability to push extension updates. A leaked Marketplace PAT allows an attacker to distribute malicious updates across the entire install base, one case had over 150,000 cumulative installs exposed.</p><p><strong>Extension dependency attacks.</strong> VS Code extensions can depend on other extensions and npm packages. A compromised dependency can inject malicious code into an otherwise legitimate extension update, mirroring the cascading dependency problem in GitHub Actions.</p><p><strong>Fork/recommended extension attacks.</strong> VS Code forks (like Cursor, VSCodium) recommend extensions from the Open VSX registry, which has even fewer security controls than the official Marketplace. Researchers demonstrated that missing extensions in Open VSX could be typosquatted to target users of these forks.</p><h2>Conclusion</h2><p>Preventing open source malware is hard but necessary work. The attack surface continues to expand, and many teams are not prepared for zero day responses to these kinds of attacks. Teams should take immediate action to make sure they&#8217;re secured by implementing the relevant guardrails.</p><p><strong>CVEs and malware are different problems with different mitigations</strong>, and conflating them is how you build a program that feels comprehensive but leaves the actual attack surface wide open. Start with the &#8220;Do Right Now&#8221; items. Pin your versions, audit your Actions, stop loading untrusted pickle files. The harder controls (sandboxed installs, SLSA provenance, ephemeral runners) take longer, but the easy ones eliminate a significant chunk of your exposure today</p><h1>Appendix:</h1><p><a href="https://www.latio.com/blog/the-complete-guide-to-preventing-open-source-malware#appendix">For the Maturity Model, Tools List, and Additional Resources, see the blog on Latio&#8217;s website.</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://pulse.latio.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Latio Pulse is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[How to Know If the Trivy Supply Chain Attack Hit You]]></title><description><![CDATA[And how to get your Security Operations team ready for supply chain malware]]></description><link>https://pulse.latio.tech/p/how-to-know-if-the-trivy-supply-chain</link><guid isPermaLink="false">https://pulse.latio.tech/p/how-to-know-if-the-trivy-supply-chain</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Sat, 21 Mar 2026 17:42:41 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/89bb4502-b835-4234-92aa-434bd11779b2_1752x1517.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2Mwa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68b9eb87-0250-4cc9-b22a-0c8ad437336e_2505x869.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2Mwa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68b9eb87-0250-4cc9-b22a-0c8ad437336e_2505x869.png 424w, https://substackcdn.com/image/fetch/$s_!2Mwa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68b9eb87-0250-4cc9-b22a-0c8ad437336e_2505x869.png 848w, https://substackcdn.com/image/fetch/$s_!2Mwa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68b9eb87-0250-4cc9-b22a-0c8ad437336e_2505x869.png 1272w, https://substackcdn.com/image/fetch/$s_!2Mwa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68b9eb87-0250-4cc9-b22a-0c8ad437336e_2505x869.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2Mwa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68b9eb87-0250-4cc9-b22a-0c8ad437336e_2505x869.png" width="1456" height="505" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68b9eb87-0250-4cc9-b22a-0c8ad437336e_2505x869.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:505,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:396397,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/191691380?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68b9eb87-0250-4cc9-b22a-0c8ad437336e_2505x869.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2Mwa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68b9eb87-0250-4cc9-b22a-0c8ad437336e_2505x869.png 424w, https://substackcdn.com/image/fetch/$s_!2Mwa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68b9eb87-0250-4cc9-b22a-0c8ad437336e_2505x869.png 848w, https://substackcdn.com/image/fetch/$s_!2Mwa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68b9eb87-0250-4cc9-b22a-0c8ad437336e_2505x869.png 1272w, https://substackcdn.com/image/fetch/$s_!2Mwa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68b9eb87-0250-4cc9-b22a-0c8ad437336e_2505x869.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Diagram of Supply Chain Malware Scope https://link.excalidraw.com/l/6qFzFKIJXdd/7XdnxM1wXUI</figcaption></figure></div><p>Earlier this week, on March 19, 2026, Aqua&#8217;s Trivy scanners were attacked. This latest supply chain malware attack represents a significant advancement in exploit techniques and serves as yet another in a series of endless wakeup calls for security teams.</p><p>Previous malware attacks like Shai-Hulud were easier to detect because they generally relied on secret scanners, encoding those secrets (twice for epic security), and then sending them up into a public repo for attackers to scrape. While a pain to deal with, brute force attacks were at least easy to spot: simply scan for the repo prefix to see if you were impacted. <strong>The latest Trivy compromise represents a major step forward in attacker sophistication</strong>, due to the complexity of fail safes deployed, as well as the usage of C2 servers and encryption over encoding.</p><p><strong>This post will focus on why these attacks are so difficult to detect and respond to, and what you&#8217;ll need to investigate if you were affected</strong>. In the process we&#8217;ll see why the industry is fundamentally underprepared for this becoming a major attack vector. For technical deep-dives on the attack itself:</p><ul><li><p><a href="https://www.wiz.io/blog/trivy-compromised-teampcp-supply-chain-attack">Rami and the team at Wiz</a></p></li><li><p><a href="https://www.aikido.dev/blog/teampcp-deploys-worm-npm-trivy-compromise">Charlie and the team at Aikido</a></p></li><li><p><a href="https://opensourcemalware.com/repository/https%3A%2F%2Fgithub.com%2Faquasecurity%2Ftrivy%2F">Paul and the team OpenSourceMalware</a></p></li><li><p><a href="https://socket.dev/blog/trivy-under-attack-again-github-actions-compromise">Philipp and the team at Socket</a></p></li><li><p><a href="https://www.stepsecurity.io/blog/trivy-compromised-a-second-time---malicious-v0-69-4-release">Varun and the team at StepSecurity</a></p></li><li><p><a href="https://labs.boostsecurity.io/articles/20-days-later-trivy-compromise-act-ii/">Fran&#231;ois and the team at Boost Security</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://pulse.latio.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://pulse.latio.tech/subscribe?"><span>Subscribe now</span></a></p><p></p><h2>How we learn if a package has been compromised</h2><p>Very few organizations invest in upstream malware scanning, and we should be genuinely grateful for each of them. While many companies do bespoke research, it&#8217;s better to call what&#8217;s emerging &#8220;open-source incident response&#8221; &#8211; and it&#8217;s being run by an unofficial consortium of researchers making everyone safer. The primary organizations doing this at scale are Aikido, Wiz, OpenSourceMalware, StepSecurity and Socket; but many other organizations such as Datadog, Veracode, Boost Security and others also contribute research.</p><p>While we&#8217;re grateful for the research, the underlying concern should be that this stuff isn&#8217;t magic, and small research teams are doing a lot of heavy lifting &#8211; using open source packages is risky, and you need to take appropriate security steps to secure your environments against zero days.</p><p>At the risk of being a broken record, detection and response tools need to expand further into the application layer to detect these attacks when they bypass scanning tools and researchers. Just as we have an EDR instead of antivirus, teams need to adopt CADR rather than relying on searching for file hashes after the exploit has happened. You can read more about the latest developments in preventative application protection in our <a href="https://www.latio.com/downloads/2026-Latio-Application-Security-Report.pdf?token=NwYOIJJZBh_nbs1MAzB8nNixD_GIg-zNOCn6frWoPok&amp;ref=latio.ghost.io">application security report</a> on page 26, the TL;DR is that as AI makes vulnerability discovery and application layer malware more achievable, the patching and praying approach is too slow.</p><h2>How to understand if you&#8217;ve been impacted</h2><p>Even if you know that you use affected packages or GitHub actions, most organizations do not have adequate telemetry to assess the impact &#8211; and subsequently which secrets need to be rotated. Teams lack telemetry because open source packages get installed everywhere, namely developer machines, pipelines, staging environments, and production. Developer machines and pipelines go especially unmonitored.</p><p>In earlier supply chain attacks the blast radius has been lessened by simple mistakes attackers (or researchers) made, such as only working on Github runners, or not properly establishing persistence. The latest Trivy attack shows more sophistication, taking several other paths for optional persistence later, encrypting rather than encoding, posting secrets to an attacker server, and not leaving obvious evidence behind.</p><p><a href="https://ramimac.me/trivy-teampcp/">IoC&#8217;s</a> involve searching for external domain traffic, and monitoring egress traffic for cloud workloads is one of those &#8220;we&#8217;ll do it later&#8221; projects for security teams (one reason I&#8217;m a fan of <a href="https://www.cloudfence.com/">cloudfence</a>). If you&#8217;re building your own telemetry, here&#8217;s what you need to be able to have quick access to search:</p><ol><li><p>Developer laptops for installed package versions, egress traffic to attacker domain, file hashes once provided by a vendor. Typical tools: EDR, local vulnerability scanning (SCA), firewalls.</p></li><li><p>Github actions logs and egress traffic. These are extremely rare for organizations to have in a consolidated location, if at all in the case of egress logs. Typical tools: SIEMs, observability tools, eBPF sensors and CDR tools.</p></li><li><p>Staging/Production file hashes, package versions, and egress traffic. Most organizations do not fully monitor their egress traffic - another benefit of CADR runtime tools. Typical tools: CADR, Container Vulnerability scanners (CNAPP).</p></li></ol><p>In short, being able to know if you&#8217;ve been impacted is not automatic: it requires a lot of pre-emptive work to make sure you&#8217;re equipped to respond.</p><h2>How to respond If you&#8217;ve been impacted</h2><p>There&#8217;s one line in most of the response blogs that&#8217;s easy to say but hard to achieve: &#8220;assume total compromise of the system and rotate all credentials.&#8221; For most organizations, this project alone ends up being a fire drill made worse by the kind of persistence that impacted <a href="https://github.com/aquasecurity/trivy/discussions/10425">Trivy</a> in this case. If all tokens aren&#8217;t invalidated first, and then reissued, attackers can use the permissions of an established token to see the newly generated ones.</p><p>For most companies, this means guaranteed downtime, and is a complete nightmare:</p><ol><li><p>Identify scope of the compromise: which secrets have access to which permissions, which themselves may have access to further secrets downstream</p></li><li><p>Universally deactivate the secrets, or in cases where refresh tokens may be issued (such as AWS), apply a universal deny policy to the identity before deactivation</p></li><li><p>Issue new tokens across workloads.</p></li></ol><p>For most companies, this is far from trivial, and it&#8217;s almost a guarantee that things will get missed. There are many approaches worth spinning up sooner than later to avoiding these pain points:</p><ol><li><p>Use JIT wherever possible for human and non-human identities</p></li><li><p>Have a clear process in place for secrets rotation, using an external secrets manager rather than hardcoded keys</p></li></ol><p>Scoping the impact is the harder part; to be frank, there isn&#8217;t a great way to do this yourself and is the primary benefit of NHI security providers - showing token relationships and permissions, and monitoring them for indicators of compromise.</p><h2>How to prevent supply chain attacks</h2><p>Preventing supply chain malware is challenging, because there are so many forms it takes. Did the attack compromise hosted actions? A new package version? An old one? Here are the basic steps to take:</p><ol><li><p>As stated everywhere: if you&#8217;re using open source github actions, pin to version SHAs rather than version numbers. Yes this is a pain, yes it makes updates harder, but this is the most likely attack vector.</p></li><li><p><a href="https://github.com/boostsecurityio/poutine/">Scan</a> for secure workflow configurations</p></li><li><p>Restrict the access of Github Actions across your organization: Follow <a href="https://docs.github.com/en/organizations/managing-organization-settings/disabling-or-limiting-github-actions-for-your-organization">Github&#8217;s guide</a> to use actions with the least privileges required.</p></li><li><p>Lockdown your open source installers (there are several open source tools for doing this, and your default installer might have them as configs such as pip):</p><ol><li><p>Require a cooldown period of one week before version updates (yes this ironically means slower patching for vulnerabilities)</p></li><li><p>Disable pre and post-install scripts</p></li><li><p>Expand your data pool for SBOMs to include packages installed on local dev machines, pipelines, staging, and prod environments.</p></li></ol></li></ol><p>The unspoken assumption behind these preventative measures is they require that malware gets flagged upstream rather quickly. This is something organizations shouldn&#8217;t count on, and why preventative ADR capabilities that prevent malware execution in third party packages is so important.</p><h2>What should you do if you&#8217;re an open source maintainer</h2><p>Open source maintainers are under a lot of pressure already, and preventing supply chain attacks offers yet another headache. In addition to the above steps, maintainers should:</p><ol><li><p>Enforce MFA on all the things - GitHub and package registries</p></li><li><p>Audit and cleanup user permissions and unused tokens</p></li><li><p>Stop using Github classic tokens</p></li><li><p>Migrate off of long-lived tokens for deployments, and sign releases</p></li><li><p><a href="https://scorecard.dev/">Audit Github actions</a></p><p></p></li></ol><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://pulse.latio.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Latio Pulse is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h4>Conclusion</h4><p>These attacks are only getting worse and scarier, and if you don&#8217;t have these things in place you won&#8217;t even know you&#8217;ve been impacted, and you may find yourself propagating the next major attack. To use a dated reference, we&#8217;re all one malware away from all being Solarwinds - turning our software into distribution centers for more malware.</p><p>The core problem is that we treat open source software as trusted software, akin to installing from an app store where every application is approved by a vendor. Unfortunately, Open Source operates more like a shared responsibility model, one where the provider doesn&#8217;t actually own any of the responsibility. While Application Security teams have an established practice around vulnerability management, responding to incidents in open source packages is a discipline more akin to security operations, who oftentimes lack the necessary telemetry and training required to respond.</p>]]></content:encoded></item><item><title><![CDATA[The 2026 Latio Application Security Report is Live!]]></title><description><![CDATA[This report provides a real breakdown of the modern AppSec landscape with practical guidance]]></description><link>https://pulse.latio.tech/p/the-2026-latio-application-security</link><guid isPermaLink="false">https://pulse.latio.tech/p/the-2026-latio-application-security</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Tue, 17 Feb 2026 15:03:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!FKjT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09763a4b-7da5-4891-b718-4faf6e114407_2400x1260.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FKjT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09763a4b-7da5-4891-b718-4faf6e114407_2400x1260.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FKjT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09763a4b-7da5-4891-b718-4faf6e114407_2400x1260.png 424w, https://substackcdn.com/image/fetch/$s_!FKjT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09763a4b-7da5-4891-b718-4faf6e114407_2400x1260.png 848w, https://substackcdn.com/image/fetch/$s_!FKjT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09763a4b-7da5-4891-b718-4faf6e114407_2400x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!FKjT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09763a4b-7da5-4891-b718-4faf6e114407_2400x1260.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FKjT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09763a4b-7da5-4891-b718-4faf6e114407_2400x1260.png" width="1456" height="764" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/09763a4b-7da5-4891-b718-4faf6e114407_2400x1260.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:764,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:308051,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/188257770?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09763a4b-7da5-4891-b718-4faf6e114407_2400x1260.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FKjT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09763a4b-7da5-4891-b718-4faf6e114407_2400x1260.png 424w, https://substackcdn.com/image/fetch/$s_!FKjT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09763a4b-7da5-4891-b718-4faf6e114407_2400x1260.png 848w, https://substackcdn.com/image/fetch/$s_!FKjT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09763a4b-7da5-4891-b718-4faf6e114407_2400x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!FKjT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09763a4b-7da5-4891-b718-4faf6e114407_2400x1260.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We met with over one hundred application security providers, practitioners, and buyers, to accurately map the past, present, and future of application security into an industry defining report.</p><p>This report is for teams building their application security programs and looking to understand the latest developments in application security. It&#8217;s also for product builders, marketers, founders, and investors looking to deepen their understanding of the current state of the application security market.</p><p>In this report, we argue:</p><ul><li><p> That application security is a discipline in crisis, as AI rapidly changes scanner capabilities and developer workflows</p></li><li><p>The present solutions landscape offers a variety of approaches to scanner consolidation and workflows</p></li><li><p>The silent death of ASPM as a standalone management category in favor of broader CTEM platforms with code to cloud capabilities</p></li><li><p>There are presently varied approaches to securing AI generated code.</p></li></ul><p>We&#8217;ll be sharing various snippets of the report and what they mean for the market from Latio&#8217;s page, so follow along for updates. Thank you so much for your continued support of Latio and our hands on keyboard approach to research!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://latio.com/downloads/2026-Latio-Application-Security-Report.pdf?token=NwYOIJJZBh_nbs1MAzB8nNixD_GIg-zNOCn6frWoPok&quot;,&quot;text&quot;:&quot;Get the Report&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://latio.com/downloads/2026-Latio-Application-Security-Report.pdf?token=NwYOIJJZBh_nbs1MAzB8nNixD_GIg-zNOCn6frWoPok"><span>Get the Report</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[The 5 Security Features that will lead in 2026, and 3 that should]]></title><description><![CDATA[There&#8217;s no better way to ring in the new year than opining about the future of cybersecurity tooling with friends and family.]]></description><link>https://pulse.latio.tech/p/the-5-security-features-that-will</link><guid isPermaLink="false">https://pulse.latio.tech/p/the-5-security-features-that-will</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Tue, 23 Dec 2025 13:59:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5fzN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef422ef9-f791-4b0e-b4e0-937226c30c6d_2400x1260.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5fzN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef422ef9-f791-4b0e-b4e0-937226c30c6d_2400x1260.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5fzN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef422ef9-f791-4b0e-b4e0-937226c30c6d_2400x1260.png 424w, https://substackcdn.com/image/fetch/$s_!5fzN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef422ef9-f791-4b0e-b4e0-937226c30c6d_2400x1260.png 848w, https://substackcdn.com/image/fetch/$s_!5fzN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef422ef9-f791-4b0e-b4e0-937226c30c6d_2400x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!5fzN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef422ef9-f791-4b0e-b4e0-937226c30c6d_2400x1260.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5fzN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef422ef9-f791-4b0e-b4e0-937226c30c6d_2400x1260.png" width="1456" height="764" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef422ef9-f791-4b0e-b4e0-937226c30c6d_2400x1260.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:764,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1115383,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/182417411?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef422ef9-f791-4b0e-b4e0-937226c30c6d_2400x1260.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5fzN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef422ef9-f791-4b0e-b4e0-937226c30c6d_2400x1260.png 424w, https://substackcdn.com/image/fetch/$s_!5fzN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef422ef9-f791-4b0e-b4e0-937226c30c6d_2400x1260.png 848w, https://substackcdn.com/image/fetch/$s_!5fzN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef422ef9-f791-4b0e-b4e0-937226c30c6d_2400x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!5fzN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef422ef9-f791-4b0e-b4e0-937226c30c6d_2400x1260.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There&#8217;s no better way to ring in the new year than opining about the future of cybersecurity tooling with friends and family. Below are five critical features that I predict will sell themselves in 2026, and three features that I personally think are most important.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://pulse.latio.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Latio Pulse is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><br><strong>The 5 Product Capabilities That Will Dominate in 2026</strong></h2><h3><strong>Supply Chain Malware Detection</strong></h3><p>Whether we like it or not, the security industry is highly reactionary. Upstream supply chain malware detection has existed for a long time, with vendors like <a href="https://docs.phylum.io/">Phylum</a> and <a href="https://socket.dev/">Socket</a> doing a lot of challenging work early on to detect emerging threats in open source code. This feature was ahead of its time for a few reasons:</p><ul><li><p>Teams didn&#8217;t understand the difference between malware and vulnerabilities</p></li><li><p>Teams want this feature as part of their overall application security platform</p></li><li><p>Developer adoption for NPM wrappers and firewalls is extremely low</p></li></ul><p>The last two years have seen widespread impact from open source malware, with attacks like Shai Hulud compromising thousands of organizations. The widespread impacts here are no longer hypothetical, forcing teams to answer for their solution.</p><p><strong>Supply Chain Malware is no longer an afterthought for teams going into 2026, and it&#8217;s a priority feature during application security assessments.</strong></p><p><a href="https://youtu.be/KXsloVTW1To">You can watch our video on Shai Hulud here</a>.</p><h3>AI Vulnerability Remediation and Prioritization</h3><p>(that&#8217;s not just a chatbot)</p><p>The emerging Continuous Threat Exposure Management (CTEM) category has been a weird one for startups. 2025 saw many vulnerability management startups consolidate, with buying vendors ranging from application to cloud to network security. This consolidation happened because selling a point solution tool to manage your tools is hard, but it&#8217;s a great differentiator between platforms fighting to be the single pane of glass for your security program.</p><p>In 2025 we&#8217;ve seen an explosion of new vulnerability management approaches driven by AI - from auto-remediation to investigation and prioritization. Historically, vulnerability focused startups struggled to find mass adoption as single panes of glass for the same reason the prior CTEM vendors did - teams treated them as a tool to manage your tools, which wasn&#8217;t a compelling budget line item.<br><br>The newer solutions have more narrow scopes, tied directly to budgetable outcomes for the teams that understand the importance of AI vulnerability remediation and risk prioritization.</p><p><a href="https://www.youtube.com/watch?v=9f_h0Fzgijc">You can watch our video on Maze as an example vendor here</a>.</p><h3>AI Visibility, <s>Guardrails</s>, and Testing</h3><p>Two years ago, <a href="https://pulse.latio.tech/p/llm-security-architecture">I shared how AI security architectures</a> are challenging, due to how quickly an organization&#8217;s risk exposure can change. Early chatbots introduced little risk - just regurgitation of public information back to a user. Agentic systems however rapidly increase risk, making in depth security measures essential. Adding to the confusion for startup builders, the majority of the security industry doesn&#8217;t know what good looks like, while those on the cutting edge have specific expectations of products.</p><p>In 2026, most tools offer some basic visibility into your AI systems, telling you what models are getting used by your workloads or called in your code. These tools provide a basic overview of  how AI agents function in your environment, and are the starting point for most security teams. These capabilities are already available from most major providers.</p><p>Runtime guardrails are a more niche capability of some tooling, but companies that started here have expanded elsewhere. Most major cloud providers and frameworks offer their own guardrails instrumentation that will grow much faster in both adoption and sophistication than security specific tools. While runtime protection remains important more broadly for AI systems, code instrumented guardrails are best left to the major AI providers rather than security startups.</p><p>Testing however always has fallen under security&#8217;s purview. Many DAST providers are now adding LLM red teaming capabilities, largely trying different prompt injection techniques. While these features will become widespread over time, they&#8217;ll be a major testing driver for 2026.</p><p><a href="https://latio.com/downloads/2025-Latio-AI-Security-Report.pdf?token=uTwAT8NIRXcyunh5sM5ypLV5grQYWipR0sO0dwTDHjo">You can access our full AI report here</a>.</p><h3>AI Based Detections | SAST, DAST, DLP, and Phishing</h3><p>AI is incredible at helping developers write code, it&#8217;s equally incredible at analyzing code for security flaws. AI based detections are a categorical improvement wherever they&#8217;re deployed - from SAST to DAST to DLP to Phishing. AI excels anywhere complex manual review of small amounts of static data was required to get the best results. <br><br>Many security companies have focused on building AI based assistants and workflows, but those who have focused on rebuilding their detection engines to support semantic analysis will win big in 2026.</p><p><a href="https://youtu.be/8IgSHYHd2MQ">You can watch our video on AI SAST here</a>.</p><h3>SOC Augmenters</h3><p>Security Operations teams are currently under a barrage of pitches from startups promising everything from cheaper data ingestion costs to seamless querying of large amounts of data. This has led to a flood of confusion about what is or isn&#8217;t a necessary part of a security operations arsenal.</p><p>The core of every SOC is quite simple and unchanging: a SIEM. The success of Cribl has revealed to many startups that there is plenty of room for flourishing around the SIEM - from making data ingestion easier, to long term storage, to detection engineering. Even attack surface management solutions and CNAPPs are positioned as SOC enablement tools by providing asset contexts.</p><p>CISOs recognize that their SOC teams need a better way to handle everything from AppSec to Cloud Security more effectively, and will allocate budget to modernize this workflow where it makes sense - from AI MDRs to data pipeline tools.</p><p><a href="https://www.latio.com/blog/exploring-the-future-of-ai-soc">You can read our latest article on AI SOC capabilities here</a>.</p><h2><strong>3 Capabilities That Should Be On Your Radar in 2026</strong></h2><p>If I were building a security program, here are the three capabilities  that I would make room for in my 2026 security efforts.</p><ol><li><p><a href="https://www.latio.com/blog/everything-to-know-about-runtime">ADR: runtime function level reachability</a>, robust application detection, and emerging in-application AI detections.</p></li></ol><p>As ADR capabilities have developed, I&#8217;ve only grown more impressed with the results they can deliver teams - from exploit prevention, to AI security, to prioritization. This category of tools is in my opinion the best budget line item a team can open up.</p><ol start="2"><li><p><a href="https://pulse.latio.tech/p/developer-mdm">Developer endpoint security</a>:</p></li></ol><p>Developer endpoints continue to face dismal security standards, with many teams having no real way to even know what their attack surface looks like on these devices. From MCP servers to open source malware, developer laptops are more exposed than ever before. Tools like <a href="https://www.koi.ai/">Koi</a> led the charge in 2025, but expect massive investments in this category as AI coding assists have forced Application Security vendors to take a second look at developer endpoints more broadly.</p><ol start="3"><li><p>Realtime AI threat modeling and design review: building an overall map of your application architecture that updates with your documentation and pull requests</p></li></ol><p>In application security we&#8217;ve said for a long time that a threat model should be the starting point for a program rather than an after thought. Despite this, AI threat modelling has yet to be widely deployed by most application security platforms. Early versions of these tools do a great job at both exposing potential vulnerabilities and helping teams better understand how their applications function.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://pulse.latio.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://pulse.latio.tech/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Emerging Categories: The Evolution of AI SOC]]></title><description><![CDATA[Part one of a series reviewing emerging tools categories going into 2026]]></description><link>https://pulse.latio.tech/p/emerging-categories-the-evolution</link><guid isPermaLink="false">https://pulse.latio.tech/p/emerging-categories-the-evolution</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Tue, 02 Dec 2025 13:57:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!aoyS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71cb975c-949d-409d-bdbf-d6ce50dbc9aa_1330x1226.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This post was completed in collaboration with the team at <a href="https://mate.security/">Mate Security</a> who let me use their product to show their AI SOC capabilities and asked me to speak honestly about the platform.</em></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wj7X!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21abf232-d3f9-4308-b796-7dd17330b718_4046x1232.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wj7X!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21abf232-d3f9-4308-b796-7dd17330b718_4046x1232.png 424w, https://substackcdn.com/image/fetch/$s_!wj7X!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21abf232-d3f9-4308-b796-7dd17330b718_4046x1232.png 848w, https://substackcdn.com/image/fetch/$s_!wj7X!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21abf232-d3f9-4308-b796-7dd17330b718_4046x1232.png 1272w, https://substackcdn.com/image/fetch/$s_!wj7X!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21abf232-d3f9-4308-b796-7dd17330b718_4046x1232.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wj7X!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21abf232-d3f9-4308-b796-7dd17330b718_4046x1232.png" width="728" height="221.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/21abf232-d3f9-4308-b796-7dd17330b718_4046x1232.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:443,&quot;width&quot;:1456,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:626454,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/180420209?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21abf232-d3f9-4308-b796-7dd17330b718_4046x1232.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wj7X!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21abf232-d3f9-4308-b796-7dd17330b718_4046x1232.png 424w, https://substackcdn.com/image/fetch/$s_!wj7X!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21abf232-d3f9-4308-b796-7dd17330b718_4046x1232.png 848w, https://substackcdn.com/image/fetch/$s_!wj7X!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21abf232-d3f9-4308-b796-7dd17330b718_4046x1232.png 1272w, https://substackcdn.com/image/fetch/$s_!wj7X!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21abf232-d3f9-4308-b796-7dd17330b718_4046x1232.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>As an emerging category, AI SOC has earned mixed reviews and seen massive changes over the last year. On the one hand, like most AI tooling, when it works it feels magical, delivering unique insights and automation. On the other hand, too often the tools create instant friction as they lead security analysts down wrong paths while driving up costs with inefficient queries.</p><p>This article will cover the challenges that arrived with the first wave of AI SOC tools, and how a second wave of AI SOC tools are addressing these concerns by delivering a more AI native user experience. I argue that this transformed user experience gets us much closer to the outcomes we expect from AI.</p><p><em>As a quick aside, there is a third kind of AI SOC tool which functions more as a complete data platform, two examples being Exaforce and AI Strike, which won&#8217;t be the subject of this article because there are far fewer vendors doing it, and the use case is more robust.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://pulse.latio.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Latio Pulse is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>The Challenges with AI SOC Tools</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!V-42!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107b26c9-981c-4594-8b2d-3cde5f87cc4d_681x315.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!V-42!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107b26c9-981c-4594-8b2d-3cde5f87cc4d_681x315.png 424w, https://substackcdn.com/image/fetch/$s_!V-42!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107b26c9-981c-4594-8b2d-3cde5f87cc4d_681x315.png 848w, https://substackcdn.com/image/fetch/$s_!V-42!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107b26c9-981c-4594-8b2d-3cde5f87cc4d_681x315.png 1272w, https://substackcdn.com/image/fetch/$s_!V-42!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107b26c9-981c-4594-8b2d-3cde5f87cc4d_681x315.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!V-42!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107b26c9-981c-4594-8b2d-3cde5f87cc4d_681x315.png" width="681" height="315" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/107b26c9-981c-4594-8b2d-3cde5f87cc4d_681x315.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:315,&quot;width&quot;:681,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:30015,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/180420209?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107b26c9-981c-4594-8b2d-3cde5f87cc4d_681x315.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!V-42!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107b26c9-981c-4594-8b2d-3cde5f87cc4d_681x315.png 424w, https://substackcdn.com/image/fetch/$s_!V-42!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107b26c9-981c-4594-8b2d-3cde5f87cc4d_681x315.png 848w, https://substackcdn.com/image/fetch/$s_!V-42!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107b26c9-981c-4594-8b2d-3cde5f87cc4d_681x315.png 1272w, https://substackcdn.com/image/fetch/$s_!V-42!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107b26c9-981c-4594-8b2d-3cde5f87cc4d_681x315.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It&#8217;s always challenging to be the first mover in a new category. The first generation of AI SOC tools revealed some early challenges in applying LLMs to SOC workflows:</p><ol><li><p>Summaries that don&#8217;t add additional value to the initial alert</p></li><li><p>Running data enrichments that are cheaper done natively in the SIEM</p></li><li><p>Leaning on verbose summaries rather than actionable guidance</p></li><li><p>Increasing tool costs through unoptimized queries</p></li><li><p>Require manually building and maintaining accurate knowledge bases</p></li></ol><p>These tools should be commended for their big experimental bets, but the investments were often missed due to being too much like SOAR platforms compared to providing a true copilot experience. In the worst case, these summaries just provide additional layers of abstraction before needing to click into alerts anyways. For example, oftentimes in the tools that I have used I find myself going to the JSON responses themselves rather than trusting their AI summaries.</p><p>Many first generation AI SOC platforms have ended up closely related to traditional SOAR platforms, being used for specific enrichment or automations. Leading SOAR providers like Tines and Torq have been able to quickly incorporate AI into their tooling, further diluting the differentiation.</p><p>At their best, these tools can fetch unique insights, correlating data that otherwise an analyst would miss; but at their worst, they can spin in circles investigating meaningless information while driving up costs, like trying to look up the IP abuse status of a localhost domain.</p><h2>How New AI SOC Tools are Different</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OHxH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facec2524-e151-4b57-91d6-fdaac083abfe_789x328.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OHxH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facec2524-e151-4b57-91d6-fdaac083abfe_789x328.png 424w, https://substackcdn.com/image/fetch/$s_!OHxH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facec2524-e151-4b57-91d6-fdaac083abfe_789x328.png 848w, https://substackcdn.com/image/fetch/$s_!OHxH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facec2524-e151-4b57-91d6-fdaac083abfe_789x328.png 1272w, https://substackcdn.com/image/fetch/$s_!OHxH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facec2524-e151-4b57-91d6-fdaac083abfe_789x328.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OHxH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facec2524-e151-4b57-91d6-fdaac083abfe_789x328.png" width="789" height="328" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/acec2524-e151-4b57-91d6-fdaac083abfe_789x328.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:328,&quot;width&quot;:789,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:38918,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/180420209?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facec2524-e151-4b57-91d6-fdaac083abfe_789x328.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OHxH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facec2524-e151-4b57-91d6-fdaac083abfe_789x328.png 424w, https://substackcdn.com/image/fetch/$s_!OHxH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facec2524-e151-4b57-91d6-fdaac083abfe_789x328.png 848w, https://substackcdn.com/image/fetch/$s_!OHxH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facec2524-e151-4b57-91d6-fdaac083abfe_789x328.png 1272w, https://substackcdn.com/image/fetch/$s_!OHxH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facec2524-e151-4b57-91d6-fdaac083abfe_789x328.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A second generation of AI SOC tools offer a glimpse of future AI SOC workflows, functioning more as contextual copilots than SOAR + AI. These SOC copilots are the first tools that provide a &#8220;Claude Code but for SOC&#8221; experience rather than a &#8220;here&#8217;s some text we generated that could be possible be helpful&#8221; one.</p><p>The fundamental features of these tools are what&#8217;s setting them apart and up for success:</p><ol><li><p>Taking actions on behalf of the security analyst, for investigation and response</p></li><li><p>Investigating alongside the analyst rather than trying to provide a complete summary at the end</p></li><li><p>Continuously learning and applying organization context</p></li><li><p>Giving the analyst complete control over their workflows as they&#8217;re happening</p></li><li><p>Fine tuning agents to enable autonomous actions</p></li></ol><p>The leading tools in this new category are <a href="https://mate.security/">Mate</a> and <a href="https://legionsecurity.ai/">Legion</a>, and I was able to get in depth most recently with Mate, so this article will focus on their methodology in order to demonstrate the differentiators in this new generation of tools.</p><h2>First Differentiator: Continuous Learning</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!a3_M!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906ac07b-0b07-40bf-a9a9-15b90763ec89_1103x623.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!a3_M!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906ac07b-0b07-40bf-a9a9-15b90763ec89_1103x623.png 424w, https://substackcdn.com/image/fetch/$s_!a3_M!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906ac07b-0b07-40bf-a9a9-15b90763ec89_1103x623.png 848w, https://substackcdn.com/image/fetch/$s_!a3_M!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906ac07b-0b07-40bf-a9a9-15b90763ec89_1103x623.png 1272w, https://substackcdn.com/image/fetch/$s_!a3_M!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906ac07b-0b07-40bf-a9a9-15b90763ec89_1103x623.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!a3_M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906ac07b-0b07-40bf-a9a9-15b90763ec89_1103x623.png" width="1103" height="623" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/906ac07b-0b07-40bf-a9a9-15b90763ec89_1103x623.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:623,&quot;width&quot;:1103,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:278508,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/180420209?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906ac07b-0b07-40bf-a9a9-15b90763ec89_1103x623.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!a3_M!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906ac07b-0b07-40bf-a9a9-15b90763ec89_1103x623.png 424w, https://substackcdn.com/image/fetch/$s_!a3_M!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906ac07b-0b07-40bf-a9a9-15b90763ec89_1103x623.png 848w, https://substackcdn.com/image/fetch/$s_!a3_M!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906ac07b-0b07-40bf-a9a9-15b90763ec89_1103x623.png 1272w, https://substackcdn.com/image/fetch/$s_!a3_M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F906ac07b-0b07-40bf-a9a9-15b90763ec89_1103x623.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Mate onboarding, continuously learning your environment</figcaption></figure></div><p>From my experience working at an MDR provider, mapping organizational contexts is one of the largest challenges in security operations. Constant updates are needed to track who is responsible for an alert, what common alerts occurred, and what to do in various situations. For example, imagine having one customer who uses different DNS resolvers based on environments, and the headache that creates trying to keep analysts up to date! In the context of AI SOC, continuous learning takes on these hurdles in two forms: building an organizational knowledge base, and fine tuning various agents to excel at different tasks.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OdrH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e2718e7-2b7c-4c7b-bcd9-c0b01af57963_2882x1414.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OdrH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e2718e7-2b7c-4c7b-bcd9-c0b01af57963_2882x1414.png 424w, https://substackcdn.com/image/fetch/$s_!OdrH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e2718e7-2b7c-4c7b-bcd9-c0b01af57963_2882x1414.png 848w, https://substackcdn.com/image/fetch/$s_!OdrH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e2718e7-2b7c-4c7b-bcd9-c0b01af57963_2882x1414.png 1272w, https://substackcdn.com/image/fetch/$s_!OdrH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e2718e7-2b7c-4c7b-bcd9-c0b01af57963_2882x1414.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OdrH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e2718e7-2b7c-4c7b-bcd9-c0b01af57963_2882x1414.png" width="1456" height="714" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9e2718e7-2b7c-4c7b-bcd9-c0b01af57963_2882x1414.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:714,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:415674,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/180420209?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e2718e7-2b7c-4c7b-bcd9-c0b01af57963_2882x1414.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OdrH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e2718e7-2b7c-4c7b-bcd9-c0b01af57963_2882x1414.png 424w, https://substackcdn.com/image/fetch/$s_!OdrH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e2718e7-2b7c-4c7b-bcd9-c0b01af57963_2882x1414.png 848w, https://substackcdn.com/image/fetch/$s_!OdrH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e2718e7-2b7c-4c7b-bcd9-c0b01af57963_2882x1414.png 1272w, https://substackcdn.com/image/fetch/$s_!OdrH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e2718e7-2b7c-4c7b-bcd9-c0b01af57963_2882x1414.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Memory creation and knowledge base</figcaption></figure></div><p>When it comes to building an organizational knowledge base, the basic version has been creating a library of text that the agent can look at before deciding on an alert. The problem is that these pieces of information enter the context window too late - when the agent has already made several decisions.</p><p>Solutions like Mate instead integrate across your tools to automatically build out the context the agent will need later on - whether it&#8217;s asset ownership information, or information about your environment. What stood out to me about Mate&#8217;s approach to integrations is how it looks up data via user accounts, rather than relying on a series of bespoke integrations.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nkoD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d10ad9-e33c-4758-abf7-a4ed3fb90cfe_3018x714.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nkoD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d10ad9-e33c-4758-abf7-a4ed3fb90cfe_3018x714.png 424w, https://substackcdn.com/image/fetch/$s_!nkoD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d10ad9-e33c-4758-abf7-a4ed3fb90cfe_3018x714.png 848w, https://substackcdn.com/image/fetch/$s_!nkoD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d10ad9-e33c-4758-abf7-a4ed3fb90cfe_3018x714.png 1272w, https://substackcdn.com/image/fetch/$s_!nkoD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d10ad9-e33c-4758-abf7-a4ed3fb90cfe_3018x714.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nkoD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d10ad9-e33c-4758-abf7-a4ed3fb90cfe_3018x714.png" width="1456" height="344" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9d10ad9-e33c-4758-abf7-a4ed3fb90cfe_3018x714.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:344,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:230626,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/180420209?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d10ad9-e33c-4758-abf7-a4ed3fb90cfe_3018x714.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nkoD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d10ad9-e33c-4758-abf7-a4ed3fb90cfe_3018x714.png 424w, https://substackcdn.com/image/fetch/$s_!nkoD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d10ad9-e33c-4758-abf7-a4ed3fb90cfe_3018x714.png 848w, https://substackcdn.com/image/fetch/$s_!nkoD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d10ad9-e33c-4758-abf7-a4ed3fb90cfe_3018x714.png 1272w, https://substackcdn.com/image/fetch/$s_!nkoD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d10ad9-e33c-4758-abf7-a4ed3fb90cfe_3018x714.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Custom Agent Creation</figcaption></figure></div><p>The other aspect of continuously tuning these tools to your environment is being able to configure agents to create better outcomes. Many AI SOC tools create lackluster results, as their context window becomes bloated with unhelpful information. Mate offers the ability to create and manage custom agents, giving them relevant tools and knowledge bases. This feels more like a next generation of SOAR - tweaking agent behavior rather than APIs.</p><p>Mate&#8217;s one of the first tools I&#8217;ve seen in this category with the amount of customization necessary to roll out automations at scale.</p><h2>Second Differentiator: Copilot User Experience</h2><p>The second major aspect experienced in the first wave of tools was it lacked a copilot experience, and introduced a dashboard-y one. Unfortunately, most early AI SOC tools end up with this experience, offering yet another alert board. Or as I always affectionately call many tools - a SIEM for your SIEM.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aoyS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71cb975c-949d-409d-bdbf-d6ce50dbc9aa_1330x1226.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aoyS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71cb975c-949d-409d-bdbf-d6ce50dbc9aa_1330x1226.png 424w, https://substackcdn.com/image/fetch/$s_!aoyS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71cb975c-949d-409d-bdbf-d6ce50dbc9aa_1330x1226.png 848w, https://substackcdn.com/image/fetch/$s_!aoyS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71cb975c-949d-409d-bdbf-d6ce50dbc9aa_1330x1226.png 1272w, https://substackcdn.com/image/fetch/$s_!aoyS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71cb975c-949d-409d-bdbf-d6ce50dbc9aa_1330x1226.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aoyS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71cb975c-949d-409d-bdbf-d6ce50dbc9aa_1330x1226.png" width="1330" height="1226" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/71cb975c-949d-409d-bdbf-d6ce50dbc9aa_1330x1226.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1226,&quot;width&quot;:1330,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:265624,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/180420209?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71cb975c-949d-409d-bdbf-d6ce50dbc9aa_1330x1226.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aoyS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71cb975c-949d-409d-bdbf-d6ce50dbc9aa_1330x1226.png 424w, https://substackcdn.com/image/fetch/$s_!aoyS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71cb975c-949d-409d-bdbf-d6ce50dbc9aa_1330x1226.png 848w, https://substackcdn.com/image/fetch/$s_!aoyS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71cb975c-949d-409d-bdbf-d6ce50dbc9aa_1330x1226.png 1272w, https://substackcdn.com/image/fetch/$s_!aoyS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71cb975c-949d-409d-bdbf-d6ce50dbc9aa_1330x1226.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Investigation steps in the browser </figcaption></figure></div><p>Another differentiator coming from the second wave of tools like Mate is focusing on a user experience that helps with investigations: not just summarizing what happened, but giving you actually helpful pieces of information along the way. I can&#8217;t help but compare this to the generations of AI coding tools - moving from copy pasting code in and out of ChatGPT to using Claude Code or Cursor to work alongside AI to get to the end result.</p><p>This shift in user experience is what has finally made me open up to the category as a whole - not expecting the AI to be perfect, and instead building a UX that is always useful. This comes across first with investigations, and then fetching additional data to enrich the incident. The most helpful automation is sending a Slack to confirm common anomalous safe alerts like impossible travel.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dfv8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66aec57d-360c-4d37-acff-22943c4a3aae_1054x434.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dfv8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66aec57d-360c-4d37-acff-22943c4a3aae_1054x434.png 424w, https://substackcdn.com/image/fetch/$s_!dfv8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66aec57d-360c-4d37-acff-22943c4a3aae_1054x434.png 848w, https://substackcdn.com/image/fetch/$s_!dfv8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66aec57d-360c-4d37-acff-22943c4a3aae_1054x434.png 1272w, https://substackcdn.com/image/fetch/$s_!dfv8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66aec57d-360c-4d37-acff-22943c4a3aae_1054x434.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dfv8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66aec57d-360c-4d37-acff-22943c4a3aae_1054x434.png" width="1054" height="434" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/66aec57d-360c-4d37-acff-22943c4a3aae_1054x434.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:434,&quot;width&quot;:1054,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:65711,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/180420209?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66aec57d-360c-4d37-acff-22943c4a3aae_1054x434.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dfv8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66aec57d-360c-4d37-acff-22943c4a3aae_1054x434.png 424w, https://substackcdn.com/image/fetch/$s_!dfv8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66aec57d-360c-4d37-acff-22943c4a3aae_1054x434.png 848w, https://substackcdn.com/image/fetch/$s_!dfv8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66aec57d-360c-4d37-acff-22943c4a3aae_1054x434.png 1272w, https://substackcdn.com/image/fetch/$s_!dfv8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66aec57d-360c-4d37-acff-22943c4a3aae_1054x434.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Executing response actions via browser extensions</figcaption></figure></div><p>Again like coding assistants, the UI/UX also moves with the user to remediation actions - allowing you to take multiple actions based on what might be the most beneficial. It&#8217;s clear that moving these into the browser proves helpful, as teams can take more flexible actions based on the specific alert, instead of relying on general summaries of what to do.</p><h2>Conclusion</h2><p>Overall, I&#8217;m excited to see what&#8217;s next within the development of these more copilot-like experiences from AI SOC tools as they&#8217;ve learned from the SOAR + AI challenges that the first wave of tools dealt with. I look forward to sharing more insights about these AI SOC tools once I have more hands-on experience with them, but what I&#8217;ve seen so far is very promising, offering increased speed and precision to analysts rather than seeking to wholeheartedly replace them.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://pulse.latio.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Latio Pulse is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Shai Hulud 2.0: Analysis and Community Resources]]></title><description><![CDATA[We've complied all the best tools, prevention methods and articles for responding to Shai Hulud 2.0 and share our analysis so teams can understand the impact]]></description><link>https://pulse.latio.tech/p/shai-hulud-20-analysis-and-community</link><guid isPermaLink="false">https://pulse.latio.tech/p/shai-hulud-20-analysis-and-community</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Mon, 01 Dec 2025 14:03:46 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/3cb25dd4-4182-4b4f-90e2-37318be2bcad_892x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zCXm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59a77ac0-54de-44d6-9d9c-bb2a82262911_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zCXm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59a77ac0-54de-44d6-9d9c-bb2a82262911_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!zCXm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59a77ac0-54de-44d6-9d9c-bb2a82262911_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!zCXm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59a77ac0-54de-44d6-9d9c-bb2a82262911_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!zCXm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59a77ac0-54de-44d6-9d9c-bb2a82262911_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zCXm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59a77ac0-54de-44d6-9d9c-bb2a82262911_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/59a77ac0-54de-44d6-9d9c-bb2a82262911_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:296348,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/180402872?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59a77ac0-54de-44d6-9d9c-bb2a82262911_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zCXm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59a77ac0-54de-44d6-9d9c-bb2a82262911_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!zCXm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59a77ac0-54de-44d6-9d9c-bb2a82262911_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!zCXm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59a77ac0-54de-44d6-9d9c-bb2a82262911_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!zCXm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59a77ac0-54de-44d6-9d9c-bb2a82262911_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A proliferation of various vendor resources have been released on Shai Hulud v2, from AI generated marketing pieces to thoughtful independent research. This is an attempt to collect all of the most useful information in one place.</p><p><strong>Quick Summary: </strong>A massive number of code libraries were compromised, most prominently from Zapier, ENS Domains, PostHog, and Postman. If you ran the infected package, most secrets on the device that ran the package install can be considered compromised, and a persistent RCE was potentially setup on your device in the form of a GitHub runner. Secrets were posted via public GitHub repos which are being taken down by GitHub, with secrets owners being notified in the cases where this data is available.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://pulse.latio.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Latio Pulse is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Responder Tools:</strong></h2><p><strong>IOCs</strong>:<br>These are collections of infected package names and versions, as well as SHAs of the malware files that get left behind on endpoints that run the install.<br><br>1. <a href="https://github.com/wiz-sec-public/wiz-research-iocs/blob/main/reports/shai-hulud-2-packages.csv">Wiz GitHub CSV</a>, <a href="https://www.wiz.io/blog/shai-hulud-2-0-ongoing-supply-chain-attack">their article</a> also has the SHA1 for the infected files.<br>2. <a href="https://github.com/DataDog/indicators-of-compromise/tree/main/shai-hulud-2.0">DataDog&#8217;s GitHub CSV</a><br>3. <a href="https://www.koi.ai/incident/live-updates-sha1-hulud-the-second-coming-hundred-npm-packages-compromised">Koi CSV</a> which has individual lines for when multiple package versions are there. This link also contains SHA256 for the infected JS files for threat hunting<br>4. Several vendor blogs have comprehensive bulleted lists: <a href="https://www.aikido.dev/blog/shai-hulud-strikes-again-hitting-zapier-ensdomains">Aikido</a>, <a href="https://semgrep.dev/blog/2025/digging-for-secrets-sha1-hulud-the-second-coming-of-the-npm-worm/">Semgrep</a>, <a href="https://socket.dev/blog/shai-hulud-strikes-again-v2">Socket</a></p><p><strong>Scanners (Packages)</strong>:<br>In my opinion, it&#8217;s best to rely on your SCA tool or even a code search to check for impacted versions before scanning for them all over your environment. Second, I&#8217;d look for the SHAs included in the Wiz and Koi articles for the infected files to see if I was impacted rather than trying to hunt for the specific versions in my packages. Finally, I have not personally verified the effectiveness of these scanners.<br><br>1. <a href="https://gitlab.com/vPierre/ndaal_public_detect_shai_hulud">ndaal_public_detect</a><br>2. <a href="https://github.com/Security-Phoenix-demo/Shai-Hulud-Sha1-Hulud-V2-npm-compromise-scanner">Phoenix Security Scanner </a><br>3. <a href="https://dev.to/garciadiazjaime/shai-hulud-scanner-30nd">Jaime - Scanner and Package.json uploader</a> <br>4. <a href="https://github.com/sngular/shai-hulud-integrity-scanner">sngular scanner</a><br><br><strong>Compromised Secrets Checker:</strong><br>These companies say they gathered the public secrets exposed, decoded them, and added them into their exposed secrets databases. While I haven&#8217;t verified the comprehensiveness of what was added and always feel icky pasting secrets into public web forms, I can vouch for these being real companies that you&#8217;re yeeting your secrets into:<br><br>1. <a href="https://safe.entro.security/">Entro Are my Secrets Out?</a><br>2. <a href="https://www.gitguardian.com/hasmysecretleaked">GitGuardian Has my Secret Leaked?</a></p><p><strong>Free or Open Source NPM Package Safety Tools<br></strong><br>1. <a href="https://pnpm.io/supply-chain-security">Using pnpm with</a> cooldowns, blocking postinstall scripts, and trust policies<br>2. Aikido&#8217;s open source <a href="https://github.com/AikidoSec/safe-chain">safechain</a>, which checks against their malware feed before installing a package.<br>3. <a href="https://github.com/lirantal/npq">NPQ</a> - with a variety of open source health factor checks available, including a cooldown period setting and checking for pre and post install scripts.</p><h3>James Thoughts:</h3><ol><li><p>Saying &#8220;use fewer dependencies&#8221; is an incomplete answer. It&#8217;s a great aspirational goal, but dependencies are the reality of modern software development, and &#8220;just using less of them,&#8221; isn&#8217;t the reality. Let&#8217;s especially consider that several of these compromised dependencies were tied to commercial offerings - where you wouldn&#8217;t be able to build them in house anyways.</p></li><li><p>We can be grateful to live in a new world where more than one vendor is detecting upstream malware. As common as the headline &#8220;X vendor discovers massive ongoing supply chain attack!&#8221; is, the reality is that multiple vendors are discovering this stuff in parallel. While as early as two years ago only a couple of companies like Phylum (acquired by Veracode) and Socket were monitoring for these attacks, now a plethora of vendors are doing upstream monitoring with various tools from AI to runtime build monitoring - such as Aikido, Koi, SourceCodeRED, and StepSecurity.</p></li><li><p>Similarly, there are now many open source &#8220;protection&#8221; tools out there - with one of the first ones being Liran&#8217;s <a href="https://github.com/lirantal/npq">NPQ</a>. I&#8217;m not listing them all here because they all have the same challenge: developer adoption requires conscious effort and enforcement. Liran&#8217;s tool was released 8 years ago, your SCA scanning vendor may offer their own.</p></li><li><p>The only way you can absolutely prevent these attacks is version pinning. The only way to detect these attacks is runtime monitoring of developer endpoints, build systems, and production systems. The other preventative measures are more defense in depth ways to protect your build system while allowing some amount of automation.</p></li><li><p><a href="https://snyk.io/blog/npm-security-preventing-supply-chain-attacks/">This article</a> from Liran at Snyk, written in 2022, remains comprehensive and relevant for preventing supply chain attacks.</p></li><li><p>The only way for this to get solved &#10024; magically upstream are further hardenings and automation from maintainers, enforced by NPM. The most important of these is the rollout of <a href="https://github.blog/changelog/2025-07-31-npm-trusted-publishing-with-oidc-is-generally-available/">trusted publishing</a>, which publishes NPM packages via OIDC credentials and trusted runners, rather than long lived credentials.</p></li><li><p>For runtime mitigation of this as a zero day, the answer is complicated because you would need runtime monitoring of dev machines, CI runners, staging, and production environments. This is an unusual combination, but I&#8217;ll endlessly support using the best runtime, agent based security you can get on cloud workloads. CADR exists precisely to stop these sorts of malicious zero days in your production systems, even if in this example the best case would&#8217;ve been an alert.</p></li><li><p>From an industry analyst perspective, what does the prevalence of these attacks do to the market? From one perspective, not that much. Point solutions that focused on preventing these attacks have existed for a long time, and none have found product market fit without being part of a broader set of solutions. However, within a broader set of supply chain solutions, I believe these features to be more critical than ever. <br><br>Outside of traditional AppSec platform features, three categories that also get a small bump in usefulness are NHI, MDM (<a href="https://pulse.latio.tech/p/developer-mdm">the Koi kind</a>), and CADR, as monitoring these blind spots become more important, and there aren&#8217;t already a ton of great alternative solutions out there.</p></li></ol><h3>Consolidated Prevention Methods</h3><ol><li><p>Pin your dependency versions</p></li><li><p>Restrict pre and post install NPM scripts with your build tool</p></li><li><p>Use an allowlist model for egress on build systems</p></li><li><p>Use OIDC where possible for build secrets and/or regularly rotate them. <a href="https://openjsf.org/blog/publishing-securely-on-npm">Consider the right method</a> for publishing to NPM.</p></li><li><p>Monitor developer, build, staging, and production systems for malicious activity. Warning: this can be noisy and expensive, especially for developer workstations and build stages.</p></li><li><p>A theoretically total visibility strategy here that I&#8217;m not recommending, but more to think through everything that&#8217;s possible:</p><ol><li><p>On the developer endpoint, monitoring plugins and open source versions and activities, alongside meaningful EDR that works here (easier said than done).</p></li><li><p>On the non-human identity side, monitoring for unusual NHI token activity and unrotated credentials, indicating compromised credentials</p></li><li><p>On the runtime side, monitoring build systems, staging, and production for detection of malicious activity.</p></li></ol></li></ol><h3>Especially Useful Vendor Articles:</h3><p><strong>Updated, Latest Articles:</strong></p><ol><li><p><a href="https://www.aikido.dev/blog/shai-hulud-2-0-unknown-wonderer-supply-chain-attack">Aikido breaks down</a> the initial attack and a compromised VSX (IDE) extension</p></li><li><p><a href="https://www.wiz.io/blog/shai-hulud-2-0-aftermath-ongoing-supply-chain-attack">Wiz shares insights</a> to the amount of real compromise that happened from incident</p></li></ol><p><strong>Original:</strong></p><ol><li><p><a href="https://www.wiz.io/blog/shai-hulud-2-0-ongoing-supply-chain-attack">Wiz</a> - for their incident timeline, scope, and general analysis. Contains the payload that sets up local machines as a Github runner, and then the payload that the malware uses to scrape Github secrets by setting up a new workflow.</p></li><li><p><a href="https://www.aikido.dev/blog/github-actions-incident-shai-hulud-supply-chain-attack">Aikido</a> - their research covers some extra methods that are continuing to be used as part of the attack, such as workflow triggers in pipelines. Also everyone loves <a href="https://www.linkedin.com/in/charlie-eriksen-a318578/">Charlie</a>, and he likely found patient zero.</p></li><li><p><a href="https://socket.dev/blog/shai-hulud-strikes-again-v2">Socket</a>, <a href="https://www.stepsecurity.io/blog/sha1-hulud-the-second-coming-zapier-ens-domains-and-other-prominent-npm-packages-compromised">Step Security</a>, <a href="https://www.endorlabs.com/learn/shai-hulud-2-malware-campaign-targets-github-and-cloud-credentials-using-bun-runtime">Endor Labs</a> and <a href="https://about.gitlab.com/blog/gitlab-discovers-widespread-npm-supply-chain-attack/#the-dead-mans-switch">Gitlab</a> all provide the best walkthroughs of the exploit logic and payload itself</p></li><li><p><a href="https://securitylabs.datadoghq.com/articles/shai-hulud-2.0-npm-worm/">Datadog</a> - great diagrams of the attack, lots of examples of the exploit code, and their gharchive queries</p></li><li><p>I appreciated <a href="https://helixguard.ai/blog/malicious-sha1hulud-2025-11-24">HelixGuard</a> giving the JSON format of repos containing the secrets</p></li><li><p><a href="https://news.ycombinator.com/item?id=46032539">Hackernews</a> thread always has interesting takes to follow along with</p></li><li><p><a href="https://www.stream.security/post/the-shai-hulud-2-0-npm-worm-what-happened-how-stream-detected-it">Stream Security</a> gave a good example of what detecting this behavior at runtime might look like. For clarity, they&#8217;re not the only tool that would detect this, but this is useful for seeing what the alerts look like.</p></li></ol><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://pulse.latio.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Latio Pulse is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Unpacking Wizdom and GitHub Universe 2025]]></title><description><![CDATA[What the announcements mean for the future of cloud and application security]]></description><link>https://pulse.latio.tech/p/unpacking-wizdom-and-github-universe</link><guid isPermaLink="false">https://pulse.latio.tech/p/unpacking-wizdom-and-github-universe</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Fri, 14 Nov 2025 13:53:12 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/4c4ed6e3-f105-4bbc-afe2-8c587f5dc5a5_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SUTA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40cb115e-03c8-4030-a4a4-e447fec4d570_1600x436.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SUTA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40cb115e-03c8-4030-a4a4-e447fec4d570_1600x436.png 424w, https://substackcdn.com/image/fetch/$s_!SUTA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40cb115e-03c8-4030-a4a4-e447fec4d570_1600x436.png 848w, https://substackcdn.com/image/fetch/$s_!SUTA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40cb115e-03c8-4030-a4a4-e447fec4d570_1600x436.png 1272w, https://substackcdn.com/image/fetch/$s_!SUTA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40cb115e-03c8-4030-a4a4-e447fec4d570_1600x436.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SUTA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40cb115e-03c8-4030-a4a4-e447fec4d570_1600x436.png" width="1456" height="397" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/40cb115e-03c8-4030-a4a4-e447fec4d570_1600x436.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:397,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SUTA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40cb115e-03c8-4030-a4a4-e447fec4d570_1600x436.png 424w, https://substackcdn.com/image/fetch/$s_!SUTA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40cb115e-03c8-4030-a4a4-e447fec4d570_1600x436.png 848w, https://substackcdn.com/image/fetch/$s_!SUTA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40cb115e-03c8-4030-a4a4-e447fec4d570_1600x436.png 1272w, https://substackcdn.com/image/fetch/$s_!SUTA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40cb115e-03c8-4030-a4a4-e447fec4d570_1600x436.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Over the last two weeks I attended user conferences for two of the biggest presences in cloud and application security - <a href="https://github.com/events/universe/recap">GitHub</a> and <a href="https://www.wiz.io/blog/wizdom-product-launches-2025">Wiz</a>. Both conferences demonstrated smart leadership decisions, filling feature gaps with competitors alongside delivering innovations that highlight their platform&#8217;s strengths. In this article, I&#8217;ll cover both the product announcements and what these investments signal for the industry.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://pulse.latio.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Latio Pulse is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>GitHub</h1><p>At their user conference, GitHub showed agility in opening up their platform to third party LLMs, and a new focus on enabling AI code generation at enterprise scale. Additionally, many experimental features launched: from kicking off copilot workflows from Slack conversations, to using copilot to fix vulnerabilities. GitHub also showed continued focus on enterprise management features, enabling the product to work better at scale.</p><h2>Bringing AI to Enterprise</h2><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qovs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d1de75-742e-4efc-a82e-d586a838b90f_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qovs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d1de75-742e-4efc-a82e-d586a838b90f_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!qovs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d1de75-742e-4efc-a82e-d586a838b90f_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!qovs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d1de75-742e-4efc-a82e-d586a838b90f_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!qovs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d1de75-742e-4efc-a82e-d586a838b90f_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qovs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d1de75-742e-4efc-a82e-d586a838b90f_1600x900.png" width="376" height="211.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d8d1de75-742e-4efc-a82e-d586a838b90f_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:376,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qovs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d1de75-742e-4efc-a82e-d586a838b90f_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!qovs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d1de75-742e-4efc-a82e-d586a838b90f_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!qovs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d1de75-742e-4efc-a82e-d586a838b90f_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!qovs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d1de75-742e-4efc-a82e-d586a838b90f_1600x900.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p>The overarching theme of GitHub&#8217;s releases across security and the rest of the product were <strong>bringing AI coding tools to enterprises</strong>. It&#8217;s no secret that AI code generation has the strongest product market fit in AI, and it&#8217;s awesome to see GitHub immediately moving to deliver these features to large enterprises.</p><p>While tools like Cursor, Codex, and Claude Code are getting the benchmark attention, the reality for the average enterprise developer is much more restricted. Startups can freely experiment with almost any AI CLI tool that gives the best results and vibe code their minimal viable product, but enterprise teams have to approach the adoption of AI tools responsibly and at scale across massive, complex codebases.</p><p>In order to enable deploying AI tools at scale, <strong>most of GitHub&#8217;s non-security announcements were providing ways to solve management challenges with managed rules, custom agents, and knowledge bases across distributed teams and repos</strong>. GitHub is allowing teams to bring their own models, agents, and workflows to copilot, while giving managers the ability to orchestrate these tools across their enterprise, safely.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nazr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2c3f353-d658-48e5-8bd3-d16fec1b4f30_1600x1600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nazr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2c3f353-d658-48e5-8bd3-d16fec1b4f30_1600x1600.png 424w, https://substackcdn.com/image/fetch/$s_!nazr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2c3f353-d658-48e5-8bd3-d16fec1b4f30_1600x1600.png 848w, https://substackcdn.com/image/fetch/$s_!nazr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2c3f353-d658-48e5-8bd3-d16fec1b4f30_1600x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!nazr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2c3f353-d658-48e5-8bd3-d16fec1b4f30_1600x1600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nazr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2c3f353-d658-48e5-8bd3-d16fec1b4f30_1600x1600.png" width="434" height="434" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f2c3f353-d658-48e5-8bd3-d16fec1b4f30_1600x1600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:434,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nazr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2c3f353-d658-48e5-8bd3-d16fec1b4f30_1600x1600.png 424w, https://substackcdn.com/image/fetch/$s_!nazr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2c3f353-d658-48e5-8bd3-d16fec1b4f30_1600x1600.png 848w, https://substackcdn.com/image/fetch/$s_!nazr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2c3f353-d658-48e5-8bd3-d16fec1b4f30_1600x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!nazr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2c3f353-d658-48e5-8bd3-d16fec1b4f30_1600x1600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>From a UX perspective, there&#8217;s an unavoidable tension between cloud based and local agentic coding flow</strong>s, e.g. calling copilot via Slack to open a PR, versus using copilot CLI on a developer machine. GitHub is taking steps towards unifying these experiences, allowing developers to more easily navigate between branches as some coding tasks are completed locally, and others in the cloud through VSCode. Their early experimentations with custom agents and knowledge bases are essential to making the cloud only PR experience a reality.</p><h2>Copilot Workflows Introduce a New Way to Scan</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AkwP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F826ef808-24b6-4033-b792-04cca212a05b_1600x1600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AkwP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F826ef808-24b6-4033-b792-04cca212a05b_1600x1600.png 424w, https://substackcdn.com/image/fetch/$s_!AkwP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F826ef808-24b6-4033-b792-04cca212a05b_1600x1600.png 848w, https://substackcdn.com/image/fetch/$s_!AkwP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F826ef808-24b6-4033-b792-04cca212a05b_1600x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!AkwP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F826ef808-24b6-4033-b792-04cca212a05b_1600x1600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AkwP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F826ef808-24b6-4033-b792-04cca212a05b_1600x1600.png" width="398" height="398" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/826ef808-24b6-4033-b792-04cca212a05b_1600x1600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:398,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AkwP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F826ef808-24b6-4033-b792-04cca212a05b_1600x1600.png 424w, https://substackcdn.com/image/fetch/$s_!AkwP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F826ef808-24b6-4033-b792-04cca212a05b_1600x1600.png 848w, https://substackcdn.com/image/fetch/$s_!AkwP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F826ef808-24b6-4033-b792-04cca212a05b_1600x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!AkwP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F826ef808-24b6-4033-b792-04cca212a05b_1600x1600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Now that AI code generation workflows can be kicked off asynchronously, GitHub is introducing a CodeQL analysis step that fits directly into the code generation process. <strong>For cloud based copilot generation workflows, CodeQL will get called as part of the pull request</strong>, checking for SAST vulnerabilities in the generated code. Copilot will then remediate any findings. GitHub is bringing these capabilities first to cloud generated code where the UX challenges will be less apparent. On the one hand, this promises a future where code security happens before the developer even sees the code. On the other, I haven&#8217;t found the workflow of calling a SAST tool via MCP to lead to great results when testing other tools.</p><p>The more fundamental threat GitHub&#8217;s releases pose to the application security industry is baking secure coding practices directly into the code generation workflow. AI coding is rapidly opening a new generation of what &#8220;shift left&#8221; means, as baking into the IDE becomes more about being baked into the context window itself. This shift is already hitting the market from companies like <a href="https://www.backslash.security/">Backslash</a> and <a href="https://www.arnica.io/">Arnica</a>, whose rules management approaches help developers produce secure code, without interrupting their workflows. I&#8217;ve been extremely impressed with some early hands on time comparing code generated with and without these tools.</p><h2>Code Quality Rules</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cW6t!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F558ceecc-2a8f-468d-8b5d-adba880f7894_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cW6t!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F558ceecc-2a8f-468d-8b5d-adba880f7894_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!cW6t!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F558ceecc-2a8f-468d-8b5d-adba880f7894_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!cW6t!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F558ceecc-2a8f-468d-8b5d-adba880f7894_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!cW6t!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F558ceecc-2a8f-468d-8b5d-adba880f7894_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cW6t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F558ceecc-2a8f-468d-8b5d-adba880f7894_1600x900.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/558ceecc-2a8f-468d-8b5d-adba880f7894_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cW6t!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F558ceecc-2a8f-468d-8b5d-adba880f7894_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!cW6t!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F558ceecc-2a8f-468d-8b5d-adba880f7894_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!cW6t!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F558ceecc-2a8f-468d-8b5d-adba880f7894_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!cW6t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F558ceecc-2a8f-468d-8b5d-adba880f7894_1600x900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In addition to CodeQL running on AI generated code, the other major scanning announcement was the introduction of code quality rules, also using CodeQL. While the code quality feature seemed early, lacking code coverage and clear management workflows, many teams are more than happy to migrate off their legacy code quality tools and get a more unified solution. <strong>This allows GitHub to join the surprisingly few vendors that offer unified code quality and security solutions</strong>: <a href="https://www.sonarsource.com/">Sonar</a>, <a href="https://www.aikido.dev/">Aikido</a>, and <a href="https://www.codacy.com/">Codacy</a>. For a long time end users have wanted these tools consolidated, but vendors haven&#8217;t quite delivered the maturity needed across both sides to completely win both end users over. As a developer tool first, it seems likely that GitHub takes the necessary steps to mature this solution.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MaLz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5be9a76-a43b-40ee-a9f2-175010491aac_1600x1228.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MaLz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5be9a76-a43b-40ee-a9f2-175010491aac_1600x1228.png 424w, https://substackcdn.com/image/fetch/$s_!MaLz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5be9a76-a43b-40ee-a9f2-175010491aac_1600x1228.png 848w, https://substackcdn.com/image/fetch/$s_!MaLz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5be9a76-a43b-40ee-a9f2-175010491aac_1600x1228.png 1272w, https://substackcdn.com/image/fetch/$s_!MaLz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5be9a76-a43b-40ee-a9f2-175010491aac_1600x1228.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MaLz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5be9a76-a43b-40ee-a9f2-175010491aac_1600x1228.png" width="1456" height="1117" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a5be9a76-a43b-40ee-a9f2-175010491aac_1600x1228.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1117,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MaLz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5be9a76-a43b-40ee-a9f2-175010491aac_1600x1228.png 424w, https://substackcdn.com/image/fetch/$s_!MaLz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5be9a76-a43b-40ee-a9f2-175010491aac_1600x1228.png 848w, https://substackcdn.com/image/fetch/$s_!MaLz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5be9a76-a43b-40ee-a9f2-175010491aac_1600x1228.png 1272w, https://substackcdn.com/image/fetch/$s_!MaLz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5be9a76-a43b-40ee-a9f2-175010491aac_1600x1228.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Alongside these major announcements, most of the product improvements continue to make GitHub Advanced Security enticing to teams who may prefer the management features of standalone solutions. GitHub&#8217;s management capabilities have come a long way in the last year, adding features like internet reachability from Microsoft Defender and importing Sarifs from third parties. <strong>GitHub seems to be investing in expanding their partnership capabilities, getting data in and out of the platform more effectively to enhance vulnerability workflows</strong>. All of these releases point to making GitHub a more enterprise friendly and connected platform.</p><h1>Wiz</h1><p>As we covered in the <a href="https://www.latio.com/downloads/2025-Latio-Cloud-Security-Report.pdf?token=vVTMSvMRWLvcN0YG8u-2ApRteQkZ1Wv-1Qw4ywIMb1I">Cloud Security Report</a>, it&#8217;s clear that cloud security is evolving beyond the traditional set of CNAPP features and Wiz&#8217;s announcements reinforce this. During Wizdom they defined two clear goals: continued cloud security leadership, while expanding their footprint across a company&#8217;s broader security stack - from traditional vulnerability management to attacks surface management.</p><h2>Goal 1: Continued Cloud Security Leadership</h2><p>First, Wiz expanded their agentless threat detection capabilities into workloads. <strong>By checking network and application logs on disk, Wiz is now providing agentless runtime detection that goes beyond looking at cloud logs alone</strong>. While this approach doesn&#8217;t spot or stop attacks in real time, it&#8217;s a clever addition to agentless scanning capabilities. For workloads that customers can&#8217;t deploy agents on, this provides meaningful new visibility and defense capabilities.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vaVP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0f3d8dd-02d4-4e01-8258-8628c09a2d0b_1236x656.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vaVP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0f3d8dd-02d4-4e01-8258-8628c09a2d0b_1236x656.png 424w, https://substackcdn.com/image/fetch/$s_!vaVP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0f3d8dd-02d4-4e01-8258-8628c09a2d0b_1236x656.png 848w, https://substackcdn.com/image/fetch/$s_!vaVP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0f3d8dd-02d4-4e01-8258-8628c09a2d0b_1236x656.png 1272w, https://substackcdn.com/image/fetch/$s_!vaVP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0f3d8dd-02d4-4e01-8258-8628c09a2d0b_1236x656.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vaVP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0f3d8dd-02d4-4e01-8258-8628c09a2d0b_1236x656.png" width="1236" height="656" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b0f3d8dd-02d4-4e01-8258-8628c09a2d0b_1236x656.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:656,&quot;width&quot;:1236,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vaVP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0f3d8dd-02d4-4e01-8258-8628c09a2d0b_1236x656.png 424w, https://substackcdn.com/image/fetch/$s_!vaVP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0f3d8dd-02d4-4e01-8258-8628c09a2d0b_1236x656.png 848w, https://substackcdn.com/image/fetch/$s_!vaVP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0f3d8dd-02d4-4e01-8258-8628c09a2d0b_1236x656.png 1272w, https://substackcdn.com/image/fetch/$s_!vaVP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0f3d8dd-02d4-4e01-8258-8628c09a2d0b_1236x656.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When it comes to their introduction of AI to the cloud security offering (both in terms of securing AI and using it to enable defenders) Wiz has stayed competitive with other providers. Their posture discoveries (AI-SPM) are the most ahead of competitors, extending toxic combination discoveries through to Bedrock configurations and sensitive data flows. For enabling defenders with AI, summaries now exist for Defend issues, but the grouping isn&#8217;t as mature as I&#8217;ve seen elsewhere.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5NZ4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F530fd9d4-addb-4442-a214-f4b3bfa5e120_1600x809.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5NZ4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F530fd9d4-addb-4442-a214-f4b3bfa5e120_1600x809.png 424w, https://substackcdn.com/image/fetch/$s_!5NZ4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F530fd9d4-addb-4442-a214-f4b3bfa5e120_1600x809.png 848w, https://substackcdn.com/image/fetch/$s_!5NZ4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F530fd9d4-addb-4442-a214-f4b3bfa5e120_1600x809.png 1272w, https://substackcdn.com/image/fetch/$s_!5NZ4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F530fd9d4-addb-4442-a214-f4b3bfa5e120_1600x809.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5NZ4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F530fd9d4-addb-4442-a214-f4b3bfa5e120_1600x809.png" width="1456" height="736" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/530fd9d4-addb-4442-a214-f4b3bfa5e120_1600x809.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5NZ4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F530fd9d4-addb-4442-a214-f4b3bfa5e120_1600x809.png 424w, https://substackcdn.com/image/fetch/$s_!5NZ4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F530fd9d4-addb-4442-a214-f4b3bfa5e120_1600x809.png 848w, https://substackcdn.com/image/fetch/$s_!5NZ4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F530fd9d4-addb-4442-a214-f4b3bfa5e120_1600x809.png 1272w, https://substackcdn.com/image/fetch/$s_!5NZ4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F530fd9d4-addb-4442-a214-f4b3bfa5e120_1600x809.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Wiz is also offering two AI agents: one focused on accessing and fixing issues, and another on incident response</strong>. I was able to do a hands-on workshop with MCP and the SecOps flow, and unfortunately like most AI use cases, the value was mixed. Sometimes I was able to one-shot some cool investigations, and at other times the agent would get stuck in a loop trying and struggling to accurately navigate the MCP tools calls. <strong>These are limitations I&#8217;ve experienced in most of my MCP usage and stem more from the client side than anything with the MCP tools themselves</strong>, but as the technologies improve, Wiz&#8217;s support for the capabilities will become more essential. The lead here is Wiz&#8217;s sophistication in rolling out MCP at scale with safe authorization flows for enterprises.</p><h2>Goal 2: Entering New Markets</h2><p>Beyond their core offering, Wiz has also rapidly extended into other markets - from ASM to SaaS security.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!u-Rm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e1f7f2c-038c-4fce-a2e3-ab11636bac84_1600x1069.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!u-Rm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e1f7f2c-038c-4fce-a2e3-ab11636bac84_1600x1069.png 424w, https://substackcdn.com/image/fetch/$s_!u-Rm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e1f7f2c-038c-4fce-a2e3-ab11636bac84_1600x1069.png 848w, https://substackcdn.com/image/fetch/$s_!u-Rm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e1f7f2c-038c-4fce-a2e3-ab11636bac84_1600x1069.png 1272w, https://substackcdn.com/image/fetch/$s_!u-Rm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e1f7f2c-038c-4fce-a2e3-ab11636bac84_1600x1069.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!u-Rm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e1f7f2c-038c-4fce-a2e3-ab11636bac84_1600x1069.png" width="1456" height="973" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8e1f7f2c-038c-4fce-a2e3-ab11636bac84_1600x1069.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:973,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!u-Rm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e1f7f2c-038c-4fce-a2e3-ab11636bac84_1600x1069.png 424w, https://substackcdn.com/image/fetch/$s_!u-Rm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e1f7f2c-038c-4fce-a2e3-ab11636bac84_1600x1069.png 848w, https://substackcdn.com/image/fetch/$s_!u-Rm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e1f7f2c-038c-4fce-a2e3-ab11636bac84_1600x1069.png 1272w, https://substackcdn.com/image/fetch/$s_!u-Rm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e1f7f2c-038c-4fce-a2e3-ab11636bac84_1600x1069.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>First, there&#8217;s entering the SaaS security market with a powerful Microsoft 365 integration. This extends the Wiz graph beyond current SaaS integrations like Github and Snowflake, to include workplace identities, file types, and threat detection. While at this point it&#8217;s not a full SaaS security platform, Microsoft 365 is at the heart of these tools. While Wiz&#8217;s offering wouldn&#8217;t be enough to replace a SaaS security solution, it will be a strong offering for teams who haven&#8217;t invested in that market.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!L43g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa727bce7-6c00-476c-b58d-7962c8ce32b0_1600x940.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L43g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa727bce7-6c00-476c-b58d-7962c8ce32b0_1600x940.png 424w, https://substackcdn.com/image/fetch/$s_!L43g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa727bce7-6c00-476c-b58d-7962c8ce32b0_1600x940.png 848w, https://substackcdn.com/image/fetch/$s_!L43g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa727bce7-6c00-476c-b58d-7962c8ce32b0_1600x940.png 1272w, https://substackcdn.com/image/fetch/$s_!L43g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa727bce7-6c00-476c-b58d-7962c8ce32b0_1600x940.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L43g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa727bce7-6c00-476c-b58d-7962c8ce32b0_1600x940.png" width="1456" height="855" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a727bce7-6c00-476c-b58d-7962c8ce32b0_1600x940.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:855,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!L43g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa727bce7-6c00-476c-b58d-7962c8ce32b0_1600x940.png 424w, https://substackcdn.com/image/fetch/$s_!L43g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa727bce7-6c00-476c-b58d-7962c8ce32b0_1600x940.png 848w, https://substackcdn.com/image/fetch/$s_!L43g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa727bce7-6c00-476c-b58d-7962c8ce32b0_1600x940.png 1272w, https://substackcdn.com/image/fetch/$s_!L43g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa727bce7-6c00-476c-b58d-7962c8ce32b0_1600x940.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Next, cloud security is quickly evolving into a larger vulnerability management project. Wiz&#8217;s release of ASM as a standout offering is a smart move towards this holistic future. For a long time, Wiz has done basic validation of external facing endpoints, providing screenshots of what the web application looks like from the outside. With ASM, they&#8217;re beginning the evolution towards a more robust testing solution that will likely lead to full external scanning - from DAST to Nuclei scanning styles. <strong>This moves Wiz towards providing end to end validation of if a vulnerability is exploitable</strong>.</p><p>For Wiz customers, this means that Wiz is delivering more actionable findings across your cloud, building upon the already great posture capabilities. Whether integrating third party tools, or deploying sensors on-premise, Wiz can now be used as a management platform for vulnerabilities across on-prem and cloud. Additionally, security leaders and practitioners wanting to experiment with the value of AI in their programs should encourage their teams to try the MCP integrations for themselves. While I found them of mixed helpfulness in my hands on time, the times it does work feel magical and are a glimpse of what future workflows will look like.</p><p>In many ways, Wiz&#8217;s feature investments capture the shift of the entire industry, where cloud security platforms are pivoting from a siloed function to a unified platform, and that the future of cloud security has left CNAPP behind.</p><h1>Conclusion</h1><p>Wiz and GitHub&#8217;s events demonstrate how cloud and application security solutions are evolving: application security is moving towards securing AI code generation, while cloud security is moving towards unified vulnerability and exposure management. What&#8217;s remarkable about both companies is their ability to execute on these developments at a large scale - a testament to letting strong teams continue building even in the midst of acquisitions.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://pulse.latio.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Latio Pulse is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The 2025 Latio Cloud Security Report is Live!]]></title><description><![CDATA[Get the latest insights on CNAPP, CADR, CTEM, and all your favorite acronyms]]></description><link>https://pulse.latio.tech/p/the-2025-latio-cloud-security-report</link><guid isPermaLink="false">https://pulse.latio.tech/p/the-2025-latio-cloud-security-report</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Tue, 14 Oct 2025 14:02:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!eyKS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14794b63-050a-410c-bac1-8d4bfe25f4a8_2400x1260.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eyKS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14794b63-050a-410c-bac1-8d4bfe25f4a8_2400x1260.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eyKS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14794b63-050a-410c-bac1-8d4bfe25f4a8_2400x1260.png 424w, https://substackcdn.com/image/fetch/$s_!eyKS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14794b63-050a-410c-bac1-8d4bfe25f4a8_2400x1260.png 848w, https://substackcdn.com/image/fetch/$s_!eyKS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14794b63-050a-410c-bac1-8d4bfe25f4a8_2400x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!eyKS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14794b63-050a-410c-bac1-8d4bfe25f4a8_2400x1260.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eyKS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14794b63-050a-410c-bac1-8d4bfe25f4a8_2400x1260.png" width="1456" height="764" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/14794b63-050a-410c-bac1-8d4bfe25f4a8_2400x1260.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:764,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1209127,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/176045922?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14794b63-050a-410c-bac1-8d4bfe25f4a8_2400x1260.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eyKS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14794b63-050a-410c-bac1-8d4bfe25f4a8_2400x1260.png 424w, https://substackcdn.com/image/fetch/$s_!eyKS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14794b63-050a-410c-bac1-8d4bfe25f4a8_2400x1260.png 848w, https://substackcdn.com/image/fetch/$s_!eyKS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14794b63-050a-410c-bac1-8d4bfe25f4a8_2400x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!eyKS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14794b63-050a-410c-bac1-8d4bfe25f4a8_2400x1260.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>After meeting with every cloud security provider on the market, practitioners, and buyers, we&#8217;ve mapped out the past, present, and future of cloud security into an actionable and industry defining report.</p><p>This report is for teams building their security programs, looking to understand the latest developments and approaches vendors are taking to help. It&#8217;s also for product builders, marketers, and investors looking to deepen their own understanding of the clouds security market evolution.</p><p>In the cloud security report, we argue that Cloud Native Application Protection Platforms (CNAPP) is defined in the present by code-to-cloud and runtime capabilities, and that the future will be defined by broader vulnerability management and incident response programs.</p><p>Ready to get the report? There are three ways to gain access:</p><ol><li><p>Subscribe to Latio&#8217;s Substack (Link Below)</p></li><li><p><a href="https://www.latio.com/pricing">Signup for a Latio Pro subscription</a>, which includes AI product searching, subcategory visualization, and maturity assessments</p></li><li><p>Get a link from a distributing vendor</p></li></ol><p>We will also be sharing various snippets of the report from <a href="https://www.linkedin.com/company/latio-tech/">Latio&#8217;s Linkedin</a> page, so follow along for updates. Thank you so much for your support of Latio and our hands on keyboard approach to analyst research!</p>
      <p>
          <a href="https://pulse.latio.tech/p/the-2025-latio-cloud-security-report">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Fixing the Blind Spot in Endpoint Security]]></title><description><![CDATA[How to make MDM work for developers]]></description><link>https://pulse.latio.tech/p/developer-mdm</link><guid isPermaLink="false">https://pulse.latio.tech/p/developer-mdm</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Thu, 18 Sep 2025 13:02:54 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/0aabcc94-846b-4d22-82a5-196181e6e957_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This post was completed in collaboration with the team at <a href="https://www.koi.security/">Koi Security</a>.</em></p><p><strong>One of the challenges I often faced as a systems engineer was dealing with developer endpoints.</strong> The security controls we had in place often just didn&#8217;t apply; whether it was exemptions from VPN policies, or trying to patch third party libraries, no one was ever quite sure what developer risks were or how to mitigate them.</p><p>I don&#8217;t typically do vendor specific pieces like this around product launches; however, <a href="https://www.koi.security/">Koi Security</a> is a great example of identifying an overlooked security gap, and building a no-nonsense tool to fix it. Additionally, I wanted to write about <strong>some of the approaches to securing developer endpoints in light of the NPM malware attacks</strong> this week. In this article we&#8217;ll cover the challenges protecting &amp; managing developer endpoints, and how Koi is tackling it.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://pulse.latio.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Latio Pulse is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2>The Developer Endpoint Gap</h2><p>In 2024, I met with three founders on the verge of <a href="https://www.koi.security/blog/1-6-how-we-hacked-multi-billion-dollar-companies-in-30-minutes-using-a-fake-vscode-extension">publishing a research project</a> that covered a malicious VSCode extension called &#8220;Darcula.&#8221; This extension advertised as a dark mode extension (<a href="https://draculatheme.com/">spoofing a known good one</a>), but in reality sent the contents of every opened file to a remote host. To their surprise, this fake IDE plugin took off in popularity, and <strong>infected developer machines at some of the largest organizations in the United States.</strong></p><p>In response to their surprising success, they published a project called ExtensionTotal (<a href="https://dex.koi.security/?_gl=1*1g5jj3z*_gcl_au*MTYyMTYzMjQxMC4xNzU2OTM4NjQ5">now Koidex</a>), allowing you to check for malicious VSCode extensions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ch-D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57d26d58-1550-41fb-84c0-c7aee6de9fd2_1600x627.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ch-D!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57d26d58-1550-41fb-84c0-c7aee6de9fd2_1600x627.png 424w, https://substackcdn.com/image/fetch/$s_!ch-D!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57d26d58-1550-41fb-84c0-c7aee6de9fd2_1600x627.png 848w, https://substackcdn.com/image/fetch/$s_!ch-D!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57d26d58-1550-41fb-84c0-c7aee6de9fd2_1600x627.png 1272w, https://substackcdn.com/image/fetch/$s_!ch-D!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57d26d58-1550-41fb-84c0-c7aee6de9fd2_1600x627.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ch-D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57d26d58-1550-41fb-84c0-c7aee6de9fd2_1600x627.png" width="1456" height="571" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/57d26d58-1550-41fb-84c0-c7aee6de9fd2_1600x627.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:571,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ch-D!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57d26d58-1550-41fb-84c0-c7aee6de9fd2_1600x627.png 424w, https://substackcdn.com/image/fetch/$s_!ch-D!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57d26d58-1550-41fb-84c0-c7aee6de9fd2_1600x627.png 848w, https://substackcdn.com/image/fetch/$s_!ch-D!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57d26d58-1550-41fb-84c0-c7aee6de9fd2_1600x627.png 1272w, https://substackcdn.com/image/fetch/$s_!ch-D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57d26d58-1550-41fb-84c0-c7aee6de9fd2_1600x627.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Koidex</figcaption></figure></div><p>Koidex is a quick way to query if an extension is malicious. While the success of their fake plugin might be surprising to some, IT teams have been long aware that their developer workstations are basically unprotected targets due to generous exemptions from their existing security tools. Furthermore, there are now many types of spoofing attacks targeting developers, from software supply chain takeovers to browser extensions.</p><p>In my Sysadmin life, there was an unbelievably common workflow when it came to onboarding developers: <strong>they would quickly ask for an exemption from any and all endpoint security controls.</strong> I once even had a developer get clearance on an Mobile Device Management (MDM) exemption before they accepted the role. This back and forth struggle between product leadership and IT leadership was never-ending, from false positive vulnerabilities to broken staging environments.</p><h3><strong>What is a Developer MDM</strong></h3><p><em>I use Mobile Device Management (MDM) as shorthand for a broad suite of tools focused on controlling end user devices, from phones to tablets to laptops and desktops.</em></p><p>Typically, IT teams try to consolidate their device management tooling into an Mobile Device Management (MDM) tool to manage:</p><ol><li><p>User onboarding/offboarding</p></li><li><p>Maintaining approved applications</p></li><li><p>Deploying software</p></li><li><p>Handling routine tasks like password resets.</p></li></ol><p>Traditional MDM tools are often part of securing endpoints alongside network and endpoint protection. However, these security functionalities typically break for developers as they either don&#8217;t support developer tools, flag a ton of false positives, or break existing applications.</p><p><strong>While it can be easy to point and call developers primadonnas, the reality is endpoint security controls weren&#8217;t designed to make developers' lives easier</strong>. Older endpoint security solutions break several workflows: The VPN would break staging connections, SASE tools would break local host port-forwarding, EDR would break local application tools, vulnerability scanners would lead to nonsensical results as they detected application dependencies, and MDM would hinder productivity as they waited weeks for approval of every new developer tool.</p><p><strong>Why Developer MDMs are an Emerging Need</strong></p><p><strong>CISOs spend millions on endpoint security controls, just for their most privileged workers to need exemptions.</strong> In the business world, developer productivity out ranks every other concern, and typically these machines are given wide exemptions to the normal controls, creating a massive blindspots in organizations. Unfortunately, the developer workstation has become the focal point of many modern attacks.</p><p>With open source and extension ecosystems becoming the defacto standards, it&#8217;s never been easier to trick developers (or even AI agents) into running malicious actions. <strong>While security solutions exist for each of these areas, but deployment and maintenance has been untenable.</strong> Open source malware protection requires a specialized wrapper, IDE extension adoption is always low, and MCP gateways are a pain to setup and maintain.</p><h2><strong>Threat Modelling Developer Endpoints</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yJGv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f31b9a2-4db4-497c-9025-1c5dc21a4e5f_908x424.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yJGv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f31b9a2-4db4-497c-9025-1c5dc21a4e5f_908x424.png 424w, https://substackcdn.com/image/fetch/$s_!yJGv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f31b9a2-4db4-497c-9025-1c5dc21a4e5f_908x424.png 848w, https://substackcdn.com/image/fetch/$s_!yJGv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f31b9a2-4db4-497c-9025-1c5dc21a4e5f_908x424.png 1272w, https://substackcdn.com/image/fetch/$s_!yJGv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f31b9a2-4db4-497c-9025-1c5dc21a4e5f_908x424.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yJGv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f31b9a2-4db4-497c-9025-1c5dc21a4e5f_908x424.png" width="908" height="424" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6f31b9a2-4db4-497c-9025-1c5dc21a4e5f_908x424.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:424,&quot;width&quot;:908,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yJGv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f31b9a2-4db4-497c-9025-1c5dc21a4e5f_908x424.png 424w, https://substackcdn.com/image/fetch/$s_!yJGv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f31b9a2-4db4-497c-9025-1c5dc21a4e5f_908x424.png 848w, https://substackcdn.com/image/fetch/$s_!yJGv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f31b9a2-4db4-497c-9025-1c5dc21a4e5f_908x424.png 1272w, https://substackcdn.com/image/fetch/$s_!yJGv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f31b9a2-4db4-497c-9025-1c5dc21a4e5f_908x424.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Threat Modelling Developer Workstations</figcaption></figure></div><p>Just as developer workflows require unusually privileged access to their workstations, they&#8217;re also vulnerable to unusual attacks. It&#8217;s worth walking through some of these in detail:</p><ol><li><p><strong>AI Security Concerns.</strong> I&#8217;ve been pretty anti-FUD when it comes to AI model usage. After all, what real risk is there in an employee asking ChatGPT for help responding to an email? However, developers are vulnerable due to their specific ecosystems: <a href="https://www.backslash.security/blog/hundreds-of-mcp-servers-vulnerable-to-abuse">MCP Servers</a>, <a href="https://www.reversinglabs.com/blog/rl-identifies-malware-ml-model-hosted-on-hugging-face">Hugging Face Models</a>, and various <a href="https://www.aim.security/post/when-public-prompts-turn-into-local-shells-rce-in-cursor-via-mcp-auto-start">prompt injection techniques</a> via rules or public channels make them more susceptible than the average user. Security teams have been left scrambling for visibility into developer environments in order to detect if these attacks or vulnerabilities are being exploited.</p></li><li><p><strong>Supply Chain Attacks</strong>. As open source repository takeovers grow increasingly common, with the latest series of supply chain attacks like the <a href="https://www.wiz.io/blog/s1ngularitys-aftermath">NX attack leaking many tokens that are still exploitable</a>, this trend isn&#8217;t going to stop any time soon. Developer workstations are often the first place these packages are installed to build local versions of their applications, and traditional vulnerability scanning just doesn&#8217;t matter here, as patching application vulnerabilities is significantly harder than running an Adobe update.</p></li><li><p><strong>Extension Manipulations.</strong> Developers often use specialized, privileged extensions in IDE and browser environments. <a href="https://www.ox.security/blog/can-you-trust-that-verified-symbol-exploiting-ide-extensions-is-easier-than-it-should-be/">Malicious IDE extensions</a> continue to be deployed with little protection options available to teams.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5o3t!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffca18be5-ec4f-4de5-9fa6-dd514999d3b4_1600x746.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5o3t!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffca18be5-ec4f-4de5-9fa6-dd514999d3b4_1600x746.png 424w, https://substackcdn.com/image/fetch/$s_!5o3t!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffca18be5-ec4f-4de5-9fa6-dd514999d3b4_1600x746.png 848w, https://substackcdn.com/image/fetch/$s_!5o3t!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffca18be5-ec4f-4de5-9fa6-dd514999d3b4_1600x746.png 1272w, https://substackcdn.com/image/fetch/$s_!5o3t!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffca18be5-ec4f-4de5-9fa6-dd514999d3b4_1600x746.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5o3t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffca18be5-ec4f-4de5-9fa6-dd514999d3b4_1600x746.png" width="1456" height="679" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fca18be5-ec4f-4de5-9fa6-dd514999d3b4_1600x746.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:679,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5o3t!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffca18be5-ec4f-4de5-9fa6-dd514999d3b4_1600x746.png 424w, https://substackcdn.com/image/fetch/$s_!5o3t!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffca18be5-ec4f-4de5-9fa6-dd514999d3b4_1600x746.png 848w, https://substackcdn.com/image/fetch/$s_!5o3t!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffca18be5-ec4f-4de5-9fa6-dd514999d3b4_1600x746.png 1272w, https://substackcdn.com/image/fetch/$s_!5o3t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffca18be5-ec4f-4de5-9fa6-dd514999d3b4_1600x746.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Managing Different Libraries in Koi</figcaption></figure></div><p><strong>Mitigating these risks is why I call Koi a developer MDM</strong> - existing device management tools exist for mitigating each of these concerns, but they&#8217;re all niche parts of other platforms making them difficult to deploy and maintain. AI security solutions provide visibility into MCP and model misuse, SCA tools sometimes provide a wrapper for safeguarding against malware installs, and secure browsers offer protections for chrome extensions. <strong>Koi is unique for bringing all of these tools together in a single place to make protecting developer systems obtainable for the average organization.</strong></p><p>Everywhere I&#8217;ve seen, this developer endpoint security problem has been recognized, but the juice just is not worth the squeeze to prevent potential exploits. Setting up NPM wrappers, secure browsers, VPNs, and more just didn&#8217;t seem worth the risk prevention, especially knowing the developer backlash that would inevitably come. Furthermore, I&#8217;m unaware of any solutions that organically do malicious VSCode extension tracking. An example of how widespread this challenge is comes from <a href="https://www.figma.com/blog/rolling-out-santa-without-freezing-productivity/">Figma&#8217;s experience</a> rolling out the open source solution Santa to secure their endpoints.</p><p><strong>Designed to Give Visibility Where and How it Matters</strong><br><br>Koi works by injecting endpoint visibility functionalities via existing agents - from ZScaler to Crowdstrike - to give visibility and control into developer workstations. Using this approach, they&#8217;re able to create some very native developer experiences without requiring a new agent deployment. This organically keeps developer workstations safe from malware, without compromising their workflow.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2mz7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058c3b56-fa3b-454b-b5cf-39d11ee98a11_1600x306.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2mz7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058c3b56-fa3b-454b-b5cf-39d11ee98a11_1600x306.png 424w, https://substackcdn.com/image/fetch/$s_!2mz7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058c3b56-fa3b-454b-b5cf-39d11ee98a11_1600x306.png 848w, https://substackcdn.com/image/fetch/$s_!2mz7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058c3b56-fa3b-454b-b5cf-39d11ee98a11_1600x306.png 1272w, https://substackcdn.com/image/fetch/$s_!2mz7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058c3b56-fa3b-454b-b5cf-39d11ee98a11_1600x306.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2mz7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058c3b56-fa3b-454b-b5cf-39d11ee98a11_1600x306.png" width="1456" height="278" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/058c3b56-fa3b-454b-b5cf-39d11ee98a11_1600x306.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:278,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2mz7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058c3b56-fa3b-454b-b5cf-39d11ee98a11_1600x306.png 424w, https://substackcdn.com/image/fetch/$s_!2mz7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058c3b56-fa3b-454b-b5cf-39d11ee98a11_1600x306.png 848w, https://substackcdn.com/image/fetch/$s_!2mz7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058c3b56-fa3b-454b-b5cf-39d11ee98a11_1600x306.png 1272w, https://substackcdn.com/image/fetch/$s_!2mz7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058c3b56-fa3b-454b-b5cf-39d11ee98a11_1600x306.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Controlling access to newer package versions and patch dates</figcaption></figure></div><p>To highlight one specific aspect of the tool that shows the team&#8217;s focus, I often bring up how traditional AppSec advice is to patch as quickly as possible; however, the tradeoff here of using unstable packages or ones that have been taken over increases. For example, the <a href="https://pulse.latio.tech/p/cve-2024-3094-and-open-source-security">XZ-utils attack</a> was only mitigated because most people were not on bleeding edge Linux distros. Similarly, several vendors are now offering pipeline checks for not installing packages updated within a set amount of time.</p><p>Security teams have a well defined process for managing these risks in Windows environments, rolling latest patches to a small test group before deploying them system wide. However, these processes haven&#8217;t been automated for developer packages, which this example policy from Koi is doing for teams.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://pulse.latio.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://pulse.latio.tech/subscribe?"><span>Subscribe now</span></a></p><h2><strong>Conclusion</strong></h2><p>These are my favorite types of security tools: ones that come from organic research into vulnerabilities, and building platforms around unknown niches that solve real organizational challenges. As attacks on developer tooling and workstations only increase, it&#8217;s exciting to see a solution that promises a holistic solution rather than more isolated features around particular angles. Shout out to the Koi team for trying to build a product that works for developers, not against them.</p><p><em>Thank you for reading Latio Pulse, if you&#8217;re a security practitioner, please consider taking <a href="https://forms.gle/1rCzb79gq6aNiwCb8">this brief survey</a> for our upcoming Cloud Security Report.</em></p>]]></content:encoded></item><item><title><![CDATA[LotR Episode 9: The SOC Data Breakdown]]></title><description><![CDATA[In this conversation, we discuss the evolving landscape of security operations, focusing on the challenges and innovations in data management, particularly in relation to Security Information and Event Management (SIEM) systems, data lakes, and the role of data pipelines.]]></description><link>https://pulse.latio.tech/p/lotr-episode-9-the-soc-data-breakdown</link><guid isPermaLink="false">https://pulse.latio.tech/p/lotr-episode-9-the-soc-data-breakdown</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Tue, 09 Sep 2025 13:45:44 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/172686455/23e49d1ec28a1bd76df8759d82b26c25.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this conversation, we discuss the evolving landscape of security operations, focusing on the challenges and innovations in data management, particularly in relation to Security Information and Event Management (SIEM) systems, data lakes, and the role of data pipelines. They explore the concept of cybersecurity mesh, the importance of data governance, and the need for data engineers within security teams. The discussion also touches on the impact of AI on security operations and the complexities of navigating various security tools and technologies.</p><p>Guests:</p><ul><li><p><a href="https://www.linkedin.com/in/jonathan-r-2b2742112/">Jonathan Rau</a> - VP and Distinguished Engineer at <a href="https://www.query.ai/">Query.ai</a></p></li></ul><p>Summary Points:</p><ul><li><p>The traditional SIEM model is being challenged by new data management approaches.</p></li><li><p>Data lakes are becoming essential for effective security data management.</p></li><li><p>Cybersecurity mesh offers a new way to access and utilize data across platforms.</p></li><li><p>Data hygiene is crucial for effective security operations.</p></li><li><p>Security teams often lack the necessary data management skills.</p></li><li><p>The role of data engineers is increasingly important in security teams.</p></li><li><p>Organizations need to be proactive in their data governance strategies.</p></li><li><p>AI is transforming how security operations are conducted.</p></li><li><p>Understanding the complexities of security tools is vital for effective management.</p></li><li><p>The future of cybersecurity standards is still evolving and requires adaptation.</p><p></p></li></ul><p><strong>Chapters</strong></p><p><strong>00:00 </strong>Introduction to Cybersecurity and Data Management</p><p><strong>02:21 </strong>The Evolution of Security Information and Event Management (SIEM)</p><p><strong>05:39 </strong>Challenges with Traditional SIEMs and Data Centralization</p><p><strong>08:16 </strong>The Shift Towards Data Lakes and Pipelines</p><p><strong>10:44 </strong>Understanding Data Mesh and Federated Search</p><p><strong>13:28 </strong>Navigating the Complexity of Modern Data Architectures</p><p><strong>16:22 </strong>The Role of Data Normalization and Processing</p><p><strong>19:21 </strong>Future Trends in Cybersecurity Data Management</p><p><strong>26:26 </strong>Making Security Analysts' Jobs Easier</p><p><strong>27:45 </strong>The Distinction Between Vulnerability Management and Incident Response</p><p><strong>29:16 </strong>The Role of Data Engineers in Security</p><p><strong>34:26 </strong>Data Hygiene and Security Hygiene</p><p><strong>36:49 </strong>The Need for Data Engineers in Security Teams</p><p><strong>39:41 </strong>Challenges in Tool Selection and Integration</p><p><strong>43:56 </strong>Understanding OCSF and Apache Iceberg</p>]]></content:encoded></item><item><title><![CDATA[Unpacking the 2025 AI Security Acquisitions]]></title><description><![CDATA[Over the last few months, we&#8217;ve seen an onslaught of AI Security acquisitions - all at strong margins for investors.]]></description><link>https://pulse.latio.tech/p/unpacking-the-2025-ai-security-acquisitions</link><guid isPermaLink="false">https://pulse.latio.tech/p/unpacking-the-2025-ai-security-acquisitions</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Thu, 04 Sep 2025 12:57:50 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/89255a98-a578-4acb-822b-2e0c267589dc_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;6722ad97-3762-4072-82fa-51576a342ab5&quot;,&quot;duration&quot;:null}"></div><p>Over the last few months, we&#8217;ve seen an onslaught of AI Security acquisitions - all at strong margins for investors. One might look at these and think they&#8217;re all the same, but each actually tells a slightly different story. We just published an <a href="https://latioreports.s3.us-east-1.amazonaws.com/2025+Latio+AI+Security+Report.pdf">in depth AI security market report</a> on each of these vendors, so it&#8217;s worth unpacking some similarities and differences between these acquisitions.</p><p>In this article, we&#8217;ll discuss the six recent AI Security acquisitions:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lRiD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52235f64-2a66-42a6-ad6e-b1411b42e099_1201x630.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lRiD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52235f64-2a66-42a6-ad6e-b1411b42e099_1201x630.png 424w, https://substackcdn.com/image/fetch/$s_!lRiD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52235f64-2a66-42a6-ad6e-b1411b42e099_1201x630.png 848w, https://substackcdn.com/image/fetch/$s_!lRiD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52235f64-2a66-42a6-ad6e-b1411b42e099_1201x630.png 1272w, https://substackcdn.com/image/fetch/$s_!lRiD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52235f64-2a66-42a6-ad6e-b1411b42e099_1201x630.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lRiD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52235f64-2a66-42a6-ad6e-b1411b42e099_1201x630.png" width="1201" height="630" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/52235f64-2a66-42a6-ad6e-b1411b42e099_1201x630.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:630,&quot;width&quot;:1201,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!lRiD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52235f64-2a66-42a6-ad6e-b1411b42e099_1201x630.png 424w, https://substackcdn.com/image/fetch/$s_!lRiD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52235f64-2a66-42a6-ad6e-b1411b42e099_1201x630.png 848w, https://substackcdn.com/image/fetch/$s_!lRiD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52235f64-2a66-42a6-ad6e-b1411b42e099_1201x630.png 1272w, https://substackcdn.com/image/fetch/$s_!lRiD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52235f64-2a66-42a6-ad6e-b1411b42e099_1201x630.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://pulse.latio.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Latio Pulse is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><strong>Breaking Down the Acquisition Strategies and Customer Value</strong></p><p><strong>The two acquisitions with the clearest use cases :</strong></p><p>While each of these acquisitions makes a surprising amount of sense, there are two that bring clear and immediate value propositions to their customers:</p><ol><li><p><strong>SentinelOne&#8217;s acquisition of Prompt Security.</strong> Of the acquisitions so far, Prompt and Aim provided the most comprehensive AI security platforms. They had solutions for browsers, endpoints, APIs, network proxies - basically anywhere that AI lived, they could provide visibility and some amount of control. In part because of that breadth, they were weakest at advanced application protection use cases, as well as what&#8217;s being referred to as &#8220;semantic permissioning,&#8221; i.e. determining if access is appropriate for a user based on the context of their request.Prompt and Aim were both strongest on the endpoint side of the AI security equation: providing visibility and protection for end users navigating workplace AI tools from ChatGPT to Microsoft Co-pilot. Both provided strong detection capabilities via browser plugin and other forms of endpoint controls. This acquisition makes sense for SentinelOne, looking to use their endpoint technologies to provide greater visibility and control for employee usage of generative AI - a clear and immediate value to their customer base.</p></li><li><p><strong>Cato Network&#8217;s acquisition of Aim Security.</strong> Similar to the SentinelOne acquisition, this makes a lot of sense to bolster Cato&#8217;s visibility and control of employee facing AI usage. SASE providers already have the necessary data to control AI Security usage, but they need the expertise to capitalize on the possibilities of their deep network controls. Aim&#8217;s familiarity with the data and the approaches will enable them to move quickly on the possibilities, expanding what&#8217;s possible on the AI front.</p></li></ol><p><strong>The acquisitions with more nuanced value adds</strong></p><p>While Cato and SentinelOne&#8217;s acquisitions make straightforward sense for expanding endpoint security, the other acquisitions fit into broader AI acquisition territory.</p><ol><li><p><strong>Palo Alto&#8217;s acquisition of ProtectAI</strong> was an interesting one because it indicates their confidence in building the firewall use cases in house. Palo has already deployed a lot of network based AI security controls, and an acquisition here wouldn&#8217;t have been as helpful for them. Conversely, ProtectAI was very application focused - providing testing, red teaming, runtime protection, etc. This acquisition points to Palo&#8217;s continued diversification of a security portfolio, building out more of their capabilities around what might be considered application or cloud security.</p></li><li><p><strong>Tenable&#8217;s acquisition of Apex</strong> is the least straight-forward of the acquisitions, and likely has more to do with the team than the product. Apex&#8217;s approach to AI security was heavily network based, providing some great capabilities around in-flight data protection and alerting, but they expanded into the more platform areas like APIs. Tenable&#8217;s acquisition notes here involve expanding to cover the &#8220;AI Attack Surface&#8221; which I interpret to mean incorporating Apex&#8217;s LLM detections from an attack surface management perspective, highlighting what AI technologies are in use. I would be shocked to see Tenable release a network proxy however to bring Apex&#8217;s capabilities in house.</p></li><li><p><strong>Snyk&#8217;s acquisition of Invariant Labs</strong> is the most targeted of the acquisitions here, and is built around bringing runtime AI application protection in house. Invariant provided a series of tools for building application guardrails for AI applications. This seems to indicate that Snyk has a targeted product specific approach for getting into the real time AI protection game, which makes sense given LLM&#8217;s being non-deterministic, and static analysis providing less value (e.g. &#8220;you&#8217;re not begging the model hard enough not to be vulnerable to prompt injection!&#8221;). Snyk&#8217;s focus here is an early indicator of application security vendors focusing more on AI development and AI protection than the larger AI platform offerings, which makes sense.</p></li><li><p><strong>CrowdStike&#8217;s acquisition of Onum</strong> is a pure data play rather than having much to do with AI security. CrowdStrike&#8217;s backend data model has heavily evolved over the last ten years, and the acquisition of Onum is about that continued evolution - from batch oriented SIEM architecture, to faster processing of telemetry. This is an important step in their ability to function as a modern holistic data platform that can process massive diverse logs at scale.</p></li></ol><p><strong>Key thoughts on the AI security market for companies and customers:</strong></p><ol><li><p>The AI Security platforms have set themselves up well for acquisition success, especially for the massive endpoint security market. While installing an additional agent or browser plug&#8211;in was a tough pill to swallow for the capabilities by themselves, they&#8217;re well accepted in the context of existing platforms.</p></li><li><p>Palo and Snyk&#8217;s acquisitions are the most forward thinking, as the real long term risk resides in letting non-deterministic outputs loose with sensitive user information. CISO&#8217;s continue to worry about employee AI usage falling in line with company policies, but it&#8217;s difficult to see how much longer this concern lasts outside of being just another flavor of DLP. For unregulated industries, an employee using LLM carries little more risk than a search engine.</p></li><li><p>It&#8217;s a go big or go acquisition time for the AI Security market. Noma&#8217;s fundraising of 100 million dollars suggests a bet on a distinctive AI Security platform that can rise as the &#8220;next CNAPP&#8221; opportunity, but there are several rivals who have yet to make the decision.</p></li><li><p>There&#8217;s an interesting subtext here as well that every acquisition is also in some way an &#8220;AI acquisition&#8221; as companies look to aqui-hire specialist talent, and the investor story needs some AI juice to get it to the finish line, regardless of what the current product does.</p></li><li><p>Creating a strong brand that sets you apart is critical for a winning business strategy- there are a ton of startups here, but the ones getting acquired quickly and at a premium are the ones with the biggest names and most hype behind them. As I stated in our <a href="https://thenewstack.io/beyond-the-hype-critical-takeaways-from-blackhat-and-defcon/">Black Hat summary</a>, AI Security at the moment is really whatever you say it is as best practices have yet to be established, so brand and trust carry more weight than product details.</p></li></ol>]]></content:encoded></item><item><title><![CDATA[LotR Episode 8: What is Reachability?]]></title><description><![CDATA[Featuring:]]></description><link>https://pulse.latio.tech/p/lotr-episode-8-what-is-reachability</link><guid isPermaLink="false">https://pulse.latio.tech/p/lotr-episode-8-what-is-reachability</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Tue, 12 Aug 2025 12:03:06 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/168671280/0c9977a43ce1a6f0ccd2eb0ae90ddd72.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><strong>Featuring:</strong></p><ol><li><p><a href="https://www.linkedin.com/in/omeryair/">Omer Yair</a> - Co-founder of Raven.io</p></li><li><p><a href="https://www.linkedin.com/in/martin-torp/">Martin Torp</a> - Co-founder of Coana (Now part of Socket.dev)</p></li></ol><p><strong>Summary</strong></p><p>In this conversation, the hosts explore how reachability technologies help in vulnerability management, the challenges faced in implementation, and the best practices for choosing the right approach. The discussion also highlights the significance of network reachability and function execution in assessing risks, as well as the importance of vendor comparisons in the cybersecurity landscape.</p><p><strong>Takeaways</strong></p><p>Reachability is about determining if a vulnerability is relevant to an application.</p><p>The goal of reachability is to assess exploitability.</p><p>Static analysis is simpler and does not require a running application.</p><p>Runtime reachability provides real-time insights into application behavior.</p><p>Network reachability helps prioritize vulnerabilities based on actual risk.</p><p>Function execution during runtime indicates the highest priority vulnerabilities.</p><p>Choosing between static and runtime reachability depends on organizational constraints.</p><p>The volume of CVEs is increasing, making effective prioritization essential.</p><p>Understanding vendor capabilities is crucial for effective reachability analysis.</p><p>Performance monitoring tools like Grafana can help assess the impact of security sensors.</p><p><strong>Chapters</strong></p><p>00:00 Introduction to Reachability Technologies</p><p>01:39 Defining Reachability and Its Importance</p><p>04:38 Exploring Static vs. Runtime Reachability</p><p>10:23 Diving Deeper into Static Reachability</p><p>19:02 Understanding Runtime Reachability and Its Types</p><p>26:19 Understanding Runtime Function Execution</p><p>28:33 Static vs. Runtime Analysis: A Complementary Approach</p><p>34:23 Choosing the Right Reachability Method</p><p>37:32 Challenges in In-House Vulnerability Management</p><p>39:47 The Importance of Effective CVE Management</p><p>42:45 Navigating Reachability Analysis Challenges</p><p>45:45 Optimizing Scan Times and Performance</p><p>50:47 Performance Insights and Attack Path Considerations</p>]]></content:encoded></item><item><title><![CDATA[LotR Episode 7: Securing AI Applications]]></title><description><![CDATA[Runtime AI Application Security]]></description><link>https://pulse.latio.tech/p/lotr-episode-7-securing-ai-applications</link><guid isPermaLink="false">https://pulse.latio.tech/p/lotr-episode-7-securing-ai-applications</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Tue, 22 Jul 2025 12:02:52 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/168670517/3081efdbc6792936b9dd37610058980e.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Featuring:</p><ul><li><p><a href="https://www.linkedin.com/in/dsarig/">Dor Sarig</a> - Co-Founder of Pillar Security</p></li><li><p><a href="https://www.linkedin.com/in/vrajeshio/">Vrajesh Bhavsar</a> - Co-Founder of Operant AI</p></li></ul><p>In this episode, the hosts discuss the critical aspects of AI security with industry experts. They explore the unique challenges posed by AI technologies, the role of CISOs in navigating these challenges, and the emerging threats that organizations face. The conversation emphasizes the importance of data control, compliance, and the need for robust testing and red teaming strategies. The experts also highlight industry-specific concerns and the future of AI security tools, providing valuable insights for organizations looking to secure their AI applications.</p><p><strong>Takeaways</strong></p><ul><li><p>AI fundamentally changes how we approach security.</p></li><li><p>Protecting sensitive data and models is crucial.</p></li><li><p>Security must enable innovation, not hinder it.</p></li><li><p>Data is now executable, increasing risks.</p></li><li><p>CISOs need to focus on compliance and data control.</p></li><li><p>Emerging threats require new security strategies.</p></li><li><p>Testing AI systems is complex and requires new methods.</p></li><li><p>Industry-specific regulations impact AI security needs.</p></li><li><p>Collaboration between security and data teams is essential.</p></li><li><p>The future of AI security tools is evolving rapidly.</p></li></ul><p><strong>Chapters</strong></p><p><strong>00:00 </strong>Introduction to AI Security</p><p><strong>02:29 </strong>Understanding the Shift in Security Paradigms</p><p><strong>05:18 </strong>The Rapid Evolution of AI Technologies</p><p><strong>07:45 </strong>CISO Perspectives on AI Security</p><p><strong>10:13 </strong>Top Concerns in AI Security</p><p><strong>11:59 </strong>Emerging Threats and Attack Vectors</p><p><strong>14:27 </strong>Data Governance and Compliance Challenges</p><p><strong>17:21 </strong>The Role of Security Teams in AI Programs</p><p><strong>22:30 </strong>Collaboration Between Security and Data Science</p><p><strong>23:39 </strong>The Importance of Data Control in AI Security</p><p><strong>25:00 </strong>Understanding Risks in AI Security</p><p><strong>29:02 </strong>Identifying Malicious vs. Benign Activities</p><p><strong>31:26 </strong>The Role of Testing Infrastructure in AI Security</p><p><strong>33:45 </strong>Industry-Specific Security Concerns</p><p><strong>35:52 </strong>Red Teaming and AI Security Testing</p><p><strong>39:10 </strong>The Need for Comprehensive Threat Modeling</p><p><strong>41:21 </strong>Data Security in the Age of AI</p>]]></content:encoded></item><item><title><![CDATA[Lotr Episode 6 - What is a SOC in 2025?]]></title><description><![CDATA[Digging into what modern security operations looks like]]></description><link>https://pulse.latio.tech/p/what-is-a-soc-in-2025</link><guid isPermaLink="false">https://pulse.latio.tech/p/what-is-a-soc-in-2025</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Thu, 26 Jun 2025 12:30:25 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/166440114/3587a18ab6c9e0704947e478fa59857b.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Summary</p><p>In this conversation, James Berthoty, <a href="https://www.linkedin.com/in/kylepolley/">Kyle Polley</a> from Perplexity, and <a href="https://www.linkedin.com/in/arifhuq/">Ariful Huq</a> from Exaforce explore the complexities of security operations, focusing on the role of Security Operations Centers (SOCs), the integration of AI, and the evolving landscape of cloud security. They discuss the motivations behind purchasing SOCs, the importance of compliance, and the challenges faced by security teams in managing alerts and incidents. The conversation highlights the potential of AI to enhance SOC functions, reduce alert fatigue, and improve detection engineering, while also addressing the need for context in security operations. The discussion concludes with insights on the future of security data and the operationalization of detection engineering.</p><p><strong>Takeaways</strong></p><ol><li><p>The initial push for SOCs often stems from compliance needs.</p></li><li><p>Understanding the budget is crucial when considering SOC options.</p></li><li><p>AI can significantly enhance the efficiency of SOC operations.</p></li><li><p>The integration of CNAPP and SOC is becoming increasingly important.</p></li><li><p>Contextual information is vital for effective incident response.</p></li><li><p>MDR solutions can be beneficial but may lack the necessary context.</p></li><li><p>Detection engineering requires a blend of security and software engineering skills.</p></li><li><p>Alert fatigue is a significant challenge for SOC teams.</p></li><li><p>The future of security data will encompass more than just logs.</p></li><li><p>AI has the potential to democratize security operations and improve analyst capabilities.</p><p></p></li></ol><p><strong>Chapters</strong></p><p>00:00 Introduction to Security Operations</p><p>01:31 Understanding the Need for SOCs</p><p>05:42 The Role of CNAP in Security</p><p>08:34 Balancing SOC and CNAP Solutions</p><p>10:08 Traditional SOC Roles and Responsibilities</p><p>11:45 The Evolving Nature of SOC Teams</p><p>13:49 Contextualizing Alerts in Security</p><p>15:32 Integrating AI into SOC Operations</p><p>20:52 Enhancing Analyst Efficiency with AI</p><p>25:39 Learning from Past Investigations</p><p>27:06 The Importance of Threat Hunting in SOCs</p><p>29:43 Leveraging AI for Threat Intelligence and Detection</p><p>31:02 Modernizing SOC Skills and Detection Engineering</p><p>35:00 Reimagining Detection Engineering with AI</p><p>38:43 The Role of Data Normalization in AI Models</p><p>40:48 The Future of AI in Security Operations</p><p>43:12 The Evolution of SIEM and Security Data Lakes</p>]]></content:encoded></item><item><title><![CDATA[LotR Episode 5 - Lessons from Shutting Down a Startup]]></title><description><![CDATA[Lessons from closing Myrror Security]]></description><link>https://pulse.latio.tech/p/lotr-episode-5-lessons-from-shutting</link><guid isPermaLink="false">https://pulse.latio.tech/p/lotr-episode-5-lessons-from-shutting</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Tue, 17 Jun 2025 13:45:12 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/166126538/c595af4f29bb5c2a1c34cd97244a137e.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<h3>Latio <em>On The Record</em> &#8212; Episode Recap</h3><p><strong>Guest:</strong> <strong><a href="https://www.linkedin.com/in/yoadfekete/">Yoad</a></strong><a href="https://www.linkedin.com/in/yoadfekete/"> </a><strong><a href="https://www.linkedin.com/in/yoadfekete/">Fekete</a></strong> (ex-Co-Founder &amp; CEO, Mirror Security; now leads Security &amp; Infrastructure at Lynx Security)<br><strong>Hosts:</strong> James Berthoty &amp; Charrah<br><strong>Recorded:</strong> Wednesday, June 4</p><div><hr></div><h4>Why we wanted Yoad on</h4><p>Mirror Security caught our eye back in 2022 for one reason: it tackled SolarWinds-style software-supply-chain attacks head-on, instead of stopping at familiar SCA vulnerability scans. Myrror had the rare combination of genuinely differentiated and useful technology. Two years (and one graceful shutdown) later, Yoad has a rare 360-degree view of what happens when brilliant tech meets a market that just isn&#8217;t ready.</p><div><hr></div><h4>Conversation highlights</h4><p>0:17 Yoad&#8217;s background: Microsoft IR after SolarWinds &#8594; co-founding Mirror to catch supply-chain intrusions early</p><p>4:14 Why &#8220;traditional&#8221; SCA tools don&#8217;t flag injected build artifacts&#8212;and how Mirror&#8217;s <em>binary-to-source</em> matching tried to fix that</p><p>9:18 Early market signals vs. real product-market fit: the danger of mistaking enthusiasm for intent</p><p>15:35 Founder-led sales lessons: when a two-week POC needs to end at two weeks</p><p>26:20 How to judge pivots: technical edge, ecosystem partnerships, and the &#8220;three-year-contract&#8221; wall</p><p>51:45 Recognizing shutdown flags: stagnant pipeline, long sales cycles, and repeated VC &#8220;no&#8217;s&#8221;</p><p>56:23 Yoad&#8217;s three red lights before closing: 1) zero VC appetite, 2) no pipeline growth, 3) POCs that don&#8217;t convert</p><div><hr></div><h4>Five takeaways you can use today</h4><ol><li><p><strong>&#8220;Cool&#8221; isn&#8217;t a buying signal</strong><br>If the prospect understands your tech <em>and</em> still won&#8217;t sign, it&#8217;s time to revisit the problem you solve.</p></li><li><p><strong>Own the first sales yourself</strong><br>Hiring reps won&#8217;t save a product the founder can&#8217;t sell; use outside experts only to tighten the motion.</p></li><li><p><strong>Two-week POC rule</strong><br>Value uncovered after week two rarely tips a deal&#8212;set a stop date and stick to it.</p></li><li><p><strong>Plan for the acquisition audit</strong><br>If a big-box buyer mainly wants your team, a fully remote, distributed headcount can complicate the offer.</p></li><li><p><strong>Graceful shutdowns take cash</strong><br>Budget early for vendor obligations and employee support; you owe the team a soft landing before worrying about yourself.</p></li></ol><div><hr></div><h4>What&#8217;s next for Yoad</h4><p>He&#8217;s publishing weekly LinkedIn essays on founder lessons, cybersecurity GTM strategy, and supply-chain security&#8212;worth a follow if you&#8217;re iterating on a security startup or wrestling with product-market fit.</p><div><hr></div><p>&#127911; <strong>Listen to the full episode</strong> wherever you get your podcasts, and let us know which insight resonated most.</p>]]></content:encoded></item><item><title><![CDATA[2025 Latio AI Security Report]]></title><description><![CDATA[Bringing clarity to the marketing madhouse]]></description><link>https://pulse.latio.tech/p/2025-latio-ai-security-report</link><guid isPermaLink="false">https://pulse.latio.tech/p/2025-latio-ai-security-report</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Tue, 10 Jun 2025 13:02:44 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/20f0d28f-9c79-4a3f-a01f-cfc40614290f_1545x2000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OzZD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83248c0c-1e4a-4468-a118-e61a1dfa08f6_1228x1410.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OzZD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83248c0c-1e4a-4468-a118-e61a1dfa08f6_1228x1410.png 424w, https://substackcdn.com/image/fetch/$s_!OzZD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83248c0c-1e4a-4468-a118-e61a1dfa08f6_1228x1410.png 848w, https://substackcdn.com/image/fetch/$s_!OzZD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83248c0c-1e4a-4468-a118-e61a1dfa08f6_1228x1410.png 1272w, https://substackcdn.com/image/fetch/$s_!OzZD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83248c0c-1e4a-4468-a118-e61a1dfa08f6_1228x1410.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OzZD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83248c0c-1e4a-4468-a118-e61a1dfa08f6_1228x1410.png" width="1228" height="1410" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/83248c0c-1e4a-4468-a118-e61a1dfa08f6_1228x1410.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1410,&quot;width&quot;:1228,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:263711,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/165598231?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83248c0c-1e4a-4468-a118-e61a1dfa08f6_1228x1410.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OzZD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83248c0c-1e4a-4468-a118-e61a1dfa08f6_1228x1410.png 424w, https://substackcdn.com/image/fetch/$s_!OzZD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83248c0c-1e4a-4468-a118-e61a1dfa08f6_1228x1410.png 848w, https://substackcdn.com/image/fetch/$s_!OzZD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83248c0c-1e4a-4468-a118-e61a1dfa08f6_1228x1410.png 1272w, https://substackcdn.com/image/fetch/$s_!OzZD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83248c0c-1e4a-4468-a118-e61a1dfa08f6_1228x1410.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>After months of vendor briefings, test drives, writing, and design, I&#8217;m thrilled to be sharing the 2025 Latio AI Security Report.</p><p>Security practitioners have been searching for a resource that clearly describes both what AI security challenges exist, and what solutions the market has provided. As part of this report, we surveyed numerous security leaders and found a consistent response: interest in AI Security is high, but it&#8217;s still unclear what the actual problems are.</p><p>This report brings Latio&#8217;s characteristic practitioner focused mindset to the problem, highlighting what challenges are out there, and clearly stating the maturity of various vendor offerings to the challenges. Unlike the AI-TRiSM mega category, we&#8217;ve split the market into three overall categories: </p><ol><li><p>End User Data Control</p></li><li><p>AI Posture Management</p></li><li><p>AI Application Protection</p></li></ol><p>In this report, we also explore what emerging AI capabilities are being deployed from various vendors, and delineate between AI Native offerings, and AI leading ones.</p><p>You can download the <a href="https://latioreports.s3.us-east-1.amazonaws.com/2025+Latio+AI+Security+Report+Preview.pdf">first five pages of the report here</a>, or become a paid subscriber for access to the full report.</p>
      <p>
          <a href="https://pulse.latio.tech/p/2025-latio-ai-security-report">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[What is a Runtime CNAPP Anyways?]]></title><description><![CDATA[A Deep Dive on Sweet Security]]></description><link>https://pulse.latio.tech/p/what-is-a-runtime-cnapp-anyways</link><guid isPermaLink="false">https://pulse.latio.tech/p/what-is-a-runtime-cnapp-anyways</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Thu, 05 Jun 2025 12:55:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!sSJ6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dbeb3b3-1180-400c-b614-22110678b6d1_800x533.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sSJ6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dbeb3b3-1180-400c-b614-22110678b6d1_800x533.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sSJ6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dbeb3b3-1180-400c-b614-22110678b6d1_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!sSJ6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dbeb3b3-1180-400c-b614-22110678b6d1_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!sSJ6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dbeb3b3-1180-400c-b614-22110678b6d1_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!sSJ6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dbeb3b3-1180-400c-b614-22110678b6d1_800x533.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sSJ6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dbeb3b3-1180-400c-b614-22110678b6d1_800x533.jpeg" width="800" height="533" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2dbeb3b3-1180-400c-b614-22110678b6d1_800x533.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:533,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;When it comes to your CNAPP, you want one that's actually worth&#8230; | Sweet  Security&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="When it comes to your CNAPP, you want one that's actually worth&#8230; | Sweet  Security" title="When it comes to your CNAPP, you want one that's actually worth&#8230; | Sweet  Security" srcset="https://substackcdn.com/image/fetch/$s_!sSJ6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dbeb3b3-1180-400c-b614-22110678b6d1_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!sSJ6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dbeb3b3-1180-400c-b614-22110678b6d1_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!sSJ6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dbeb3b3-1180-400c-b614-22110678b6d1_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!sSJ6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dbeb3b3-1180-400c-b614-22110678b6d1_800x533.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>This post was completed in collaboration with the team at <a href="https://www.sweet.security/?utm_campaign=13231219-James%20Berthoty&amp;utm_source=Jamesberthoty">Sweet Security</a> who let me use their product to show their runtime CNAPP capabilities and asked me to speak honestly about the pros and cons of the platform. Also, to see a demo of Sweet and many other Cloud Security tools, tune in to the <a href="https://tamnoon.io/cloud-security-showdown/">Cloud Security Showdown</a> today!</em></p><p>It&#8217;s exciting to see Cloud Native Application Protection Platforms (CNAPPs) evolve beyond their endless posture management (CSPM) origins. The idea of a runtime-first CNAPP is appealing to anyone <strong>who expects their cloud security solution to actually detect and stop ongoing attacks</strong> rather than focusing on only the discovery of posture related issues and potential vulnerabilities. </p><p>In 2025, endless posture scanning is played out and security teams need ways to reduce noise and make cloud security alerts actionable. That concept of runtime actionability has implications for both posture and runtime detection events. I suspect people will use these new breeds of runtime oriented solutions as either augments to their existing CSPM solutions, or as standalone solutions, depending on the specifics of their environment and coverage capabilities.</p><p><strong>In this report, we&#8217;ll first talk about where &#8220;runtime CNAPPs&#8221; fit in the overall landscape of security products, then discuss what makes <a href="https://www.sweet.security/?utm_campaign=13231219-James%20Berthoty&amp;utm_source=Jamesberthoty">Sweet Security&#8217;s</a> offering exciting for cloud security, and finally, what use cases would not be a good fit.</strong></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://pulse.latio.tech/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Latio Pulse is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>What is Sweet Security?</h1><p><a href="https://www.sweet.security/?utm_campaign=13231219-James%20Berthoty&amp;utm_source=Jamesberthoty">Sweet Security</a> is positioned in the growing cluster of runtime-first CNAPP solutions, with capabilities growing into the category I refer to as Cloud Application Detection Response (CADR). <strong>Sweet is meant to enable meaningful detection and response in cloud environments.</strong> They stand out for how they approach detection and response, especially when it comes to reducing alert noise and helping SOC teams understand what actually happened during an incident. Additionally, their <a href="https://www.sweet.security/press-releases/sweet-security-introduces-patent-pending-llm-powered-detection-engine-reducing-cloud-detection-noise-to-0-04">detection methodology</a> is genuinely unique among anomaly based detections, with some pros and cons. </p><h2><strong>Where Sweet Fits in the CNAPP Landscape</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Xuvh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8b90940-ab7b-4319-a740-be0f34f12bfe_988x913.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Xuvh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8b90940-ab7b-4319-a740-be0f34f12bfe_988x913.png 424w, https://substackcdn.com/image/fetch/$s_!Xuvh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8b90940-ab7b-4319-a740-be0f34f12bfe_988x913.png 848w, https://substackcdn.com/image/fetch/$s_!Xuvh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8b90940-ab7b-4319-a740-be0f34f12bfe_988x913.png 1272w, https://substackcdn.com/image/fetch/$s_!Xuvh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8b90940-ab7b-4319-a740-be0f34f12bfe_988x913.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Xuvh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8b90940-ab7b-4319-a740-be0f34f12bfe_988x913.png" width="988" height="913" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c8b90940-ab7b-4319-a740-be0f34f12bfe_988x913.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:913,&quot;width&quot;:988,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1191578,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/163866094?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8b90940-ab7b-4319-a740-be0f34f12bfe_988x913.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Xuvh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8b90940-ab7b-4319-a740-be0f34f12bfe_988x913.png 424w, https://substackcdn.com/image/fetch/$s_!Xuvh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8b90940-ab7b-4319-a740-be0f34f12bfe_988x913.png 848w, https://substackcdn.com/image/fetch/$s_!Xuvh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8b90940-ab7b-4319-a740-be0f34f12bfe_988x913.png 1272w, https://substackcdn.com/image/fetch/$s_!Xuvh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8b90940-ab7b-4319-a740-be0f34f12bfe_988x913.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The wonderful world of CNAPP feature checkboxes</figcaption></figure></div><p>Before getting into the product specifics, it&#8217;s worth briefly reviewing the broader CNAPP category. Many platforms in this space attempt to unify cloud posture management (CSPM), vulnerability management (CTEM), code scanning (ASPM), and runtime protection (CADR). T<strong>he problem is, most of them either spread themselves too thin, or bolt on features that lack depth</strong>. Larger platforms have long failed to be the single pane of glass for everything, and that has led to weaker performance at the edges. <strong>As a result, many teams end up pairing specialized tools rather than relying on single platforms.</strong> The go-to example of this is <a href="https://www.aquasec.com/news/orca-security-partner/">Aqua (runtime) and Orca (posture) having a partnership</a>, despite offering the same features on paper.</p><p><strong><a href="https://www.sweet.security/?utm_campaign=13231219-James%20Berthoty&amp;utm_source=Jamesberthoty">Sweet</a> fits into the landscape as a strong option on the runtime side</strong>. It&#8217;s not trying to be everything from code to cloud to third party vulnerability management, but instead offers meaningful detection capabilities, vulnerability discovery &amp; prioritization, and API security capabilities.</p><p>Personally, I&#8217;m a fan of this approach, and what is becoming a new category in Cloud Application Detection and Response (CADR). Instead of trying to pretend that all of these offerings are one massive tool (CNAPP), <strong>we can acknowledge that we&#8217;re really talking about four distinct clusters of capabilities</strong>, each of which are built for different security users. Every vendor chooses particular features from these clusters to implement, but it&#8217;s overly reductionistic to refer to them all as a single thing and assign a grade.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UBlK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff908d9be-d0f9-4dd2-af12-7ce474e9f98e_2070x996.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UBlK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff908d9be-d0f9-4dd2-af12-7ce474e9f98e_2070x996.png 424w, https://substackcdn.com/image/fetch/$s_!UBlK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff908d9be-d0f9-4dd2-af12-7ce474e9f98e_2070x996.png 848w, https://substackcdn.com/image/fetch/$s_!UBlK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff908d9be-d0f9-4dd2-af12-7ce474e9f98e_2070x996.png 1272w, https://substackcdn.com/image/fetch/$s_!UBlK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff908d9be-d0f9-4dd2-af12-7ce474e9f98e_2070x996.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UBlK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff908d9be-d0f9-4dd2-af12-7ce474e9f98e_2070x996.png" width="1456" height="701" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f908d9be-d0f9-4dd2-af12-7ce474e9f98e_2070x996.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:701,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:171801,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/163866094?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff908d9be-d0f9-4dd2-af12-7ce474e9f98e_2070x996.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UBlK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff908d9be-d0f9-4dd2-af12-7ce474e9f98e_2070x996.png 424w, https://substackcdn.com/image/fetch/$s_!UBlK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff908d9be-d0f9-4dd2-af12-7ce474e9f98e_2070x996.png 848w, https://substackcdn.com/image/fetch/$s_!UBlK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff908d9be-d0f9-4dd2-af12-7ce474e9f98e_2070x996.png 1272w, https://substackcdn.com/image/fetch/$s_!UBlK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff908d9be-d0f9-4dd2-af12-7ce474e9f98e_2070x996.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>At the end of the day, securing large complex cloud systems requires some combination of four capabilities:</strong></p><ol><li><p>The ability to deeply scan and contextualize their <strong>code findings</strong> (<strong>ASPM</strong>). These tools are for helping <strong>developers</strong> fix issues with code.</p></li><li><p><strong>Visibility of cloud assets</strong> with information from vulnerabilities to technologies being deployed (<strong>CSPM</strong>). These tools are for helping <strong>cloud engineers</strong> fix misconfigurations in their cloud environments.</p></li><li><p>Best in class <strong>cloud workload protection (CADR)</strong>. These emerging tools are to make cloud security operations achievable - whether for traditional <strong>SOC team</strong>s or emerging product security incident response teams.</p></li><li><p>A place to <strong>consolidate vulnerability data</strong> for reporting and actioning (<strong>CTEM</strong>). These are for <strong>vulnerability management teams</strong> in large distributed environments. <em>Whether or not this should be merged with CSPM I&#8217;ll leave up to the reader, I could go either way.</em></p></li></ol><p>Unfortunately, CNAPP just means some amount of these four things is happening, which is why I prefer keeping the acronyms distinct. But in this case, I use Runtime CNAPP and CADR interchangeably - enabling best in class cloud workload protection will come with some CSPM functionalities that makes the tools competitive. </p><p><em>A brief note on identity and DSPM, I usually lump these features up into CSPM because they are extensions of the same data, but it&#8217;s fair play to argue for them as separate categories.</em></p><h2><strong>Runtime Detection: Where Sweet Shines</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Og-2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e07fcde-9ba5-4461-b9d1-1ebcabd9e718_849x516.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Og-2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e07fcde-9ba5-4461-b9d1-1ebcabd9e718_849x516.png 424w, https://substackcdn.com/image/fetch/$s_!Og-2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e07fcde-9ba5-4461-b9d1-1ebcabd9e718_849x516.png 848w, https://substackcdn.com/image/fetch/$s_!Og-2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e07fcde-9ba5-4461-b9d1-1ebcabd9e718_849x516.png 1272w, https://substackcdn.com/image/fetch/$s_!Og-2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e07fcde-9ba5-4461-b9d1-1ebcabd9e718_849x516.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Og-2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e07fcde-9ba5-4461-b9d1-1ebcabd9e718_849x516.png" width="849" height="516" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7e07fcde-9ba5-4461-b9d1-1ebcabd9e718_849x516.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:516,&quot;width&quot;:849,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:62213,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/163866094?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e07fcde-9ba5-4461-b9d1-1ebcabd9e718_849x516.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Og-2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e07fcde-9ba5-4461-b9d1-1ebcabd9e718_849x516.png 424w, https://substackcdn.com/image/fetch/$s_!Og-2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e07fcde-9ba5-4461-b9d1-1ebcabd9e718_849x516.png 848w, https://substackcdn.com/image/fetch/$s_!Og-2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e07fcde-9ba5-4461-b9d1-1ebcabd9e718_849x516.png 1272w, https://substackcdn.com/image/fetch/$s_!Og-2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e07fcde-9ba5-4461-b9d1-1ebcabd9e718_849x516.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Combining API attacks with container attacks</figcaption></figure></div><p>Let&#8217;s start where Sweet was the strongest. In testing, Sweet stood out for its approach to <strong>incident correlation</strong>. Where other detection tools tend to drown you in alerts, often firing off dozens of findings for a single attack sequence, Sweet does a much better job summarizing what happened into a single understandable attack chain. It ties together bash execution, container drift, file tampering, and network behavior into a coherent incident view.</p><p><strong>If the main failure of operationalizing cloud security operations is the SOC not understanding cloud alerts, Sweet does a great job breaking down the attack.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ixhl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8eef27e-0c79-4603-acb2-cdaefbdd1087_1222x578.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ixhl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8eef27e-0c79-4603-acb2-cdaefbdd1087_1222x578.png 424w, https://substackcdn.com/image/fetch/$s_!Ixhl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8eef27e-0c79-4603-acb2-cdaefbdd1087_1222x578.png 848w, https://substackcdn.com/image/fetch/$s_!Ixhl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8eef27e-0c79-4603-acb2-cdaefbdd1087_1222x578.png 1272w, https://substackcdn.com/image/fetch/$s_!Ixhl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8eef27e-0c79-4603-acb2-cdaefbdd1087_1222x578.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ixhl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8eef27e-0c79-4603-acb2-cdaefbdd1087_1222x578.png" width="1222" height="578" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d8eef27e-0c79-4603-acb2-cdaefbdd1087_1222x578.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:578,&quot;width&quot;:1222,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:147456,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/163866094?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8eef27e-0c79-4603-acb2-cdaefbdd1087_1222x578.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ixhl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8eef27e-0c79-4603-acb2-cdaefbdd1087_1222x578.png 424w, https://substackcdn.com/image/fetch/$s_!Ixhl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8eef27e-0c79-4603-acb2-cdaefbdd1087_1222x578.png 848w, https://substackcdn.com/image/fetch/$s_!Ixhl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8eef27e-0c79-4603-acb2-cdaefbdd1087_1222x578.png 1272w, https://substackcdn.com/image/fetch/$s_!Ixhl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8eef27e-0c79-4603-acb2-cdaefbdd1087_1222x578.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>For example, when running a series of Atomic Red Team tests, including container escapes and file manipulations, <strong>Sweet correctly identified each technique and grouped them into a single, understandable attack chain</strong>. The tool provided clear details about what was run, which pods were involved, and how the activity unfolded. It also offered full process logs for investigation.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!p0og!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52a7090c-2691-4fe5-ad36-32edf7f54475_1228x660.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!p0og!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52a7090c-2691-4fe5-ad36-32edf7f54475_1228x660.png 424w, https://substackcdn.com/image/fetch/$s_!p0og!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52a7090c-2691-4fe5-ad36-32edf7f54475_1228x660.png 848w, https://substackcdn.com/image/fetch/$s_!p0og!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52a7090c-2691-4fe5-ad36-32edf7f54475_1228x660.png 1272w, https://substackcdn.com/image/fetch/$s_!p0og!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52a7090c-2691-4fe5-ad36-32edf7f54475_1228x660.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!p0og!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52a7090c-2691-4fe5-ad36-32edf7f54475_1228x660.png" width="1228" height="660" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/52a7090c-2691-4fe5-ad36-32edf7f54475_1228x660.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:660,&quot;width&quot;:1228,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:169921,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/163866094?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52a7090c-2691-4fe5-ad36-32edf7f54475_1228x660.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!p0og!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52a7090c-2691-4fe5-ad36-32edf7f54475_1228x660.png 424w, https://substackcdn.com/image/fetch/$s_!p0og!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52a7090c-2691-4fe5-ad36-32edf7f54475_1228x660.png 848w, https://substackcdn.com/image/fetch/$s_!p0og!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52a7090c-2691-4fe5-ad36-32edf7f54475_1228x660.png 1272w, https://substackcdn.com/image/fetch/$s_!p0og!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52a7090c-2691-4fe5-ad36-32edf7f54475_1228x660.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The most fun part of testing Sweet is how it will call me out if it notices the attack not working. The drift and manual detections correlate behind the scenes to deftly craft an accurate story of what happened, even when that involves making mistakes. In the SOC, <strong>this context is critical and the difference between pinging the DevOps team one time with a complete story of what happened and fifteen times trying to track down a false positi</strong>ve. I also managed to get my test environment infected by a real attacker, but it was immediately clear what was happening in the environment.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fZuF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13449968-5ea4-4e1d-bb98-c49fa9d4c581_1600x868.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fZuF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13449968-5ea4-4e1d-bb98-c49fa9d4c581_1600x868.png 424w, https://substackcdn.com/image/fetch/$s_!fZuF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13449968-5ea4-4e1d-bb98-c49fa9d4c581_1600x868.png 848w, https://substackcdn.com/image/fetch/$s_!fZuF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13449968-5ea4-4e1d-bb98-c49fa9d4c581_1600x868.png 1272w, https://substackcdn.com/image/fetch/$s_!fZuF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13449968-5ea4-4e1d-bb98-c49fa9d4c581_1600x868.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fZuF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13449968-5ea4-4e1d-bb98-c49fa9d4c581_1600x868.png" width="1456" height="790" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/13449968-5ea4-4e1d-bb98-c49fa9d4c581_1600x868.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:790,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fZuF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13449968-5ea4-4e1d-bb98-c49fa9d4c581_1600x868.png 424w, https://substackcdn.com/image/fetch/$s_!fZuF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13449968-5ea4-4e1d-bb98-c49fa9d4c581_1600x868.png 848w, https://substackcdn.com/image/fetch/$s_!fZuF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13449968-5ea4-4e1d-bb98-c49fa9d4c581_1600x868.png 1272w, https://substackcdn.com/image/fetch/$s_!fZuF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13449968-5ea4-4e1d-bb98-c49fa9d4c581_1600x868.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Understanding how network flows work in your application</figcaption></figure></div><p>It&#8217;s also worth mentioning how the detection capabilities cross between API, cloud and workload layers. Sweet applies this detection methodology across all of the attack layers to identify when attacks pivot into the cloud from the workload.</p><p><strong>The ability to create custom detection rules is essential to security operations teams as well</strong>. You can define behaviors, like outbound calls to suspicious IPs, that should trigger alerts, allowing for tuning and proactive guardrails. SOAR capabilities are limited, but this is far ahead of where most security teams are at. <strong>Basic capabilities like killing processes work well</strong> but teams looking to build fully automated response pipelines should look towards the Torq integration.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2_mz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94df217e-bdd1-490a-b888-39e89faab0da_1808x751.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2_mz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94df217e-bdd1-490a-b888-39e89faab0da_1808x751.png 424w, https://substackcdn.com/image/fetch/$s_!2_mz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94df217e-bdd1-490a-b888-39e89faab0da_1808x751.png 848w, https://substackcdn.com/image/fetch/$s_!2_mz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94df217e-bdd1-490a-b888-39e89faab0da_1808x751.png 1272w, https://substackcdn.com/image/fetch/$s_!2_mz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94df217e-bdd1-490a-b888-39e89faab0da_1808x751.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2_mz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94df217e-bdd1-490a-b888-39e89faab0da_1808x751.png" width="1456" height="605" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/94df217e-bdd1-490a-b888-39e89faab0da_1808x751.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:605,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:186246,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/163866094?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94df217e-bdd1-490a-b888-39e89faab0da_1808x751.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2_mz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94df217e-bdd1-490a-b888-39e89faab0da_1808x751.png 424w, https://substackcdn.com/image/fetch/$s_!2_mz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94df217e-bdd1-490a-b888-39e89faab0da_1808x751.png 848w, https://substackcdn.com/image/fetch/$s_!2_mz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94df217e-bdd1-490a-b888-39e89faab0da_1808x751.png 1272w, https://substackcdn.com/image/fetch/$s_!2_mz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94df217e-bdd1-490a-b888-39e89faab0da_1808x751.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Despite being a newer feature, application layer attack detection worked really well and was well summarized. In the above screenshot, I saw both some of my own application attacks, as well as some web crawlers trying to exploit non-existent PHP services. <strong>In keeping with the noise reduction, my actual attacks triggered stories, while the unsuccessful crawlers were logged without triggering incidents.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uGSP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55a77e6-9dae-41df-9933-8c77ca4ba7ef_1424x861.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uGSP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55a77e6-9dae-41df-9933-8c77ca4ba7ef_1424x861.png 424w, https://substackcdn.com/image/fetch/$s_!uGSP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55a77e6-9dae-41df-9933-8c77ca4ba7ef_1424x861.png 848w, https://substackcdn.com/image/fetch/$s_!uGSP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55a77e6-9dae-41df-9933-8c77ca4ba7ef_1424x861.png 1272w, https://substackcdn.com/image/fetch/$s_!uGSP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55a77e6-9dae-41df-9933-8c77ca4ba7ef_1424x861.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uGSP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55a77e6-9dae-41df-9933-8c77ca4ba7ef_1424x861.png" width="1424" height="861" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c55a77e6-9dae-41df-9933-8c77ca4ba7ef_1424x861.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:861,&quot;width&quot;:1424,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:205567,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/163866094?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55a77e6-9dae-41df-9933-8c77ca4ba7ef_1424x861.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uGSP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55a77e6-9dae-41df-9933-8c77ca4ba7ef_1424x861.png 424w, https://substackcdn.com/image/fetch/$s_!uGSP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55a77e6-9dae-41df-9933-8c77ca4ba7ef_1424x861.png 848w, https://substackcdn.com/image/fetch/$s_!uGSP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55a77e6-9dae-41df-9933-8c77ca4ba7ef_1424x861.png 1272w, https://substackcdn.com/image/fetch/$s_!uGSP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc55a77e6-9dae-41df-9933-8c77ca4ba7ef_1424x861.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>If you&#8217;re new to cloud security, you may not instantly recognize how cool the above screenshot attack story is.</strong> In isolation, a DevOps team member might look at the environment variables in a running pod, triggering an alert that an analyst has to go and hunt down; however, <strong>a DevOps team is never running an XML injection payload before doing that.</strong> This is a critical example of where the application layer enables meaningful response.</p><p>The ability for SecOps teams to get actionable application insights is what CADR is all about, and it&#8217;s awesome to see more from vendors.</p><p>It&#8217;s also worth briefly mentioning that unlike many other runtime focused providers, Sweet also provides support for Windows OS, enabling them to be a one stop replacement for your runtime security.</p><h4><strong>Where There&#8217;s Still Room to Grow on Detections</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7wiG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20be975-47ad-48cb-8dfa-32216fa3f700_1875x909.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7wiG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20be975-47ad-48cb-8dfa-32216fa3f700_1875x909.png 424w, https://substackcdn.com/image/fetch/$s_!7wiG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20be975-47ad-48cb-8dfa-32216fa3f700_1875x909.png 848w, https://substackcdn.com/image/fetch/$s_!7wiG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20be975-47ad-48cb-8dfa-32216fa3f700_1875x909.png 1272w, https://substackcdn.com/image/fetch/$s_!7wiG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20be975-47ad-48cb-8dfa-32216fa3f700_1875x909.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7wiG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20be975-47ad-48cb-8dfa-32216fa3f700_1875x909.png" width="1456" height="706" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d20be975-47ad-48cb-8dfa-32216fa3f700_1875x909.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:706,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:236358,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/163866094?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20be975-47ad-48cb-8dfa-32216fa3f700_1875x909.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7wiG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20be975-47ad-48cb-8dfa-32216fa3f700_1875x909.png 424w, https://substackcdn.com/image/fetch/$s_!7wiG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20be975-47ad-48cb-8dfa-32216fa3f700_1875x909.png 848w, https://substackcdn.com/image/fetch/$s_!7wiG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20be975-47ad-48cb-8dfa-32216fa3f700_1875x909.png 1272w, https://substackcdn.com/image/fetch/$s_!7wiG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20be975-47ad-48cb-8dfa-32216fa3f700_1875x909.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>The attack summaries could also have pros and cons when striking that delicate balance between too much noise and not enough.</strong> Every meaningful test I conducted got a story created; however, some individual events would trigger a finding. To be clear, the sensor always detected the event, so custom alerting would still have caught the attack, but it wasn&#8217;t always rolled up into an entire incident. To be honest, due to the noisiness of most cloud detection tools, I think Sweet struck a good overall balance when deciding what to alert about as critical. Every security tool has to strike a balance on deciding what to service, and Sweet did a good job.</p><p>While it wasn&#8217;t in the UI at time of testing, I&#8217;m extremely excited for Sweet&#8217;s soon to be launched <strong>potential misconfiguration detection</strong>. One of the key challenges in cloud security in the SOC is differentiating interesting events from impactful ones; Sweet picks up a lot of activity that the security team might be interested in, but isn&#8217;t necessarily related to an attack. Automatically delineating between these events is awesome and helps <strong>give security teams real time visibility without clogging up their alerts.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Cu-S!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc799246d-4b68-4036-b878-31ebd60c165d_1600x708.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Cu-S!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc799246d-4b68-4036-b878-31ebd60c165d_1600x708.png 424w, https://substackcdn.com/image/fetch/$s_!Cu-S!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc799246d-4b68-4036-b878-31ebd60c165d_1600x708.png 848w, https://substackcdn.com/image/fetch/$s_!Cu-S!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc799246d-4b68-4036-b878-31ebd60c165d_1600x708.png 1272w, https://substackcdn.com/image/fetch/$s_!Cu-S!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc799246d-4b68-4036-b878-31ebd60c165d_1600x708.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Cu-S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc799246d-4b68-4036-b878-31ebd60c165d_1600x708.png" width="1456" height="644" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c799246d-4b68-4036-b878-31ebd60c165d_1600x708.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:644,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Cu-S!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc799246d-4b68-4036-b878-31ebd60c165d_1600x708.png 424w, https://substackcdn.com/image/fetch/$s_!Cu-S!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc799246d-4b68-4036-b878-31ebd60c165d_1600x708.png 848w, https://substackcdn.com/image/fetch/$s_!Cu-S!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc799246d-4b68-4036-b878-31ebd60c165d_1600x708.png 1272w, https://substackcdn.com/image/fetch/$s_!Cu-S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc799246d-4b68-4036-b878-31ebd60c165d_1600x708.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>For example, in this test case I opened my cluster to the internet, and Sweet alerted me to it as a potentially suspicious change (in this case it was a classic oopsie in my terraform). Similarly, Sweet alerted me when I made some impactful IAM and S3 configuration changes. I&#8217;m excited for when these are surfaced as interesting misconfiguration findings rather than alerts.</p><h2><strong>Vulnerability Insights: Better than Average</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1o3n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F782c1db8-0528-4bcd-a6aa-c8bba7a78ef6_1821x827.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1o3n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F782c1db8-0528-4bcd-a6aa-c8bba7a78ef6_1821x827.png 424w, https://substackcdn.com/image/fetch/$s_!1o3n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F782c1db8-0528-4bcd-a6aa-c8bba7a78ef6_1821x827.png 848w, https://substackcdn.com/image/fetch/$s_!1o3n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F782c1db8-0528-4bcd-a6aa-c8bba7a78ef6_1821x827.png 1272w, https://substackcdn.com/image/fetch/$s_!1o3n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F782c1db8-0528-4bcd-a6aa-c8bba7a78ef6_1821x827.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1o3n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F782c1db8-0528-4bcd-a6aa-c8bba7a78ef6_1821x827.png" width="1456" height="661" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/782c1db8-0528-4bcd-a6aa-c8bba7a78ef6_1821x827.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:661,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:200363,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/163866094?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F782c1db8-0528-4bcd-a6aa-c8bba7a78ef6_1821x827.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1o3n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F782c1db8-0528-4bcd-a6aa-c8bba7a78ef6_1821x827.png 424w, https://substackcdn.com/image/fetch/$s_!1o3n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F782c1db8-0528-4bcd-a6aa-c8bba7a78ef6_1821x827.png 848w, https://substackcdn.com/image/fetch/$s_!1o3n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F782c1db8-0528-4bcd-a6aa-c8bba7a78ef6_1821x827.png 1272w, https://substackcdn.com/image/fetch/$s_!1o3n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F782c1db8-0528-4bcd-a6aa-c8bba7a78ef6_1821x827.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Vulnerability Prioritization</figcaption></figure></div><p><strong>Sweet includes vulnerability discovery and management capabilities amplified by runtime data and LLM based prioritization.</strong> At a basic level, Sweet can prioritize with the standard loaded/executed and network reachability distinctions. For the execution detection, reliability seemed based on language, and I didn&#8217;t see any function level reachability happening. This data carries into detection by optionally integrating your container registry.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ukek!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbabe9831-8d5a-42d3-91e5-07279910a78a_837x297.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ukek!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbabe9831-8d5a-42d3-91e5-07279910a78a_837x297.png 424w, https://substackcdn.com/image/fetch/$s_!ukek!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbabe9831-8d5a-42d3-91e5-07279910a78a_837x297.png 848w, https://substackcdn.com/image/fetch/$s_!ukek!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbabe9831-8d5a-42d3-91e5-07279910a78a_837x297.png 1272w, https://substackcdn.com/image/fetch/$s_!ukek!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbabe9831-8d5a-42d3-91e5-07279910a78a_837x297.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ukek!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbabe9831-8d5a-42d3-91e5-07279910a78a_837x297.png" width="837" height="297" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/babe9831-8d5a-42d3-91e5-07279910a78a_837x297.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:297,&quot;width&quot;:837,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69208,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/163866094?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbabe9831-8d5a-42d3-91e5-07279910a78a_837x297.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ukek!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbabe9831-8d5a-42d3-91e5-07279910a78a_837x297.png 424w, https://substackcdn.com/image/fetch/$s_!ukek!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbabe9831-8d5a-42d3-91e5-07279910a78a_837x297.png 848w, https://substackcdn.com/image/fetch/$s_!ukek!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbabe9831-8d5a-42d3-91e5-07279910a78a_837x297.png 1272w, https://substackcdn.com/image/fetch/$s_!ukek!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbabe9831-8d5a-42d3-91e5-07279910a78a_837x297.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Accurate prioritization reasoning even without function level reachability</figcaption></figure></div><p>However, the Sweet scoring was surprisingly accurate, understanding the nature of the packages and their common usages in applications, and prioritizing based on the context of the app.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EDqZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eec107d-e6c4-4962-99af-c6a4e16660f8_1407x861.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EDqZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eec107d-e6c4-4962-99af-c6a4e16660f8_1407x861.png 424w, https://substackcdn.com/image/fetch/$s_!EDqZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eec107d-e6c4-4962-99af-c6a4e16660f8_1407x861.png 848w, https://substackcdn.com/image/fetch/$s_!EDqZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eec107d-e6c4-4962-99af-c6a4e16660f8_1407x861.png 1272w, https://substackcdn.com/image/fetch/$s_!EDqZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eec107d-e6c4-4962-99af-c6a4e16660f8_1407x861.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EDqZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eec107d-e6c4-4962-99af-c6a4e16660f8_1407x861.png" width="1407" height="861" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8eec107d-e6c4-4962-99af-c6a4e16660f8_1407x861.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:861,&quot;width&quot;:1407,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:108793,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/163866094?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eec107d-e6c4-4962-99af-c6a4e16660f8_1407x861.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EDqZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eec107d-e6c4-4962-99af-c6a4e16660f8_1407x861.png 424w, https://substackcdn.com/image/fetch/$s_!EDqZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eec107d-e6c4-4962-99af-c6a4e16660f8_1407x861.png 848w, https://substackcdn.com/image/fetch/$s_!EDqZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eec107d-e6c4-4962-99af-c6a4e16660f8_1407x861.png 1272w, https://substackcdn.com/image/fetch/$s_!EDqZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eec107d-e6c4-4962-99af-c6a4e16660f8_1407x861.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">CVE prioritization based on runtime context</figcaption></figure></div><p>With remediation guidance, the effected image layer is given, but the LLM remediation guidance was usually not that helpful. Some critical context for fixing container vulnerabilities, like base image versions, fix availability per distro, or whether a vulnerability is fixable in an upstream layer is missing. These are the kinds of details teams need in order to actually remediate issues at scale - and details most CNAPPs don&#8217;t provide.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ctAV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b2702-c34c-4c84-a092-e1aba4c6233e_732x347.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ctAV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b2702-c34c-4c84-a092-e1aba4c6233e_732x347.png 424w, https://substackcdn.com/image/fetch/$s_!ctAV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b2702-c34c-4c84-a092-e1aba4c6233e_732x347.png 848w, https://substackcdn.com/image/fetch/$s_!ctAV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b2702-c34c-4c84-a092-e1aba4c6233e_732x347.png 1272w, https://substackcdn.com/image/fetch/$s_!ctAV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b2702-c34c-4c84-a092-e1aba4c6233e_732x347.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ctAV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b2702-c34c-4c84-a092-e1aba4c6233e_732x347.png" width="732" height="347" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3f4b2702-c34c-4c84-a092-e1aba4c6233e_732x347.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:347,&quot;width&quot;:732,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:33926,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/163866094?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b2702-c34c-4c84-a092-e1aba4c6233e_732x347.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ctAV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b2702-c34c-4c84-a092-e1aba4c6233e_732x347.png 424w, https://substackcdn.com/image/fetch/$s_!ctAV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b2702-c34c-4c84-a092-e1aba4c6233e_732x347.png 848w, https://substackcdn.com/image/fetch/$s_!ctAV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b2702-c34c-4c84-a092-e1aba4c6233e_732x347.png 1272w, https://substackcdn.com/image/fetch/$s_!ctAV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b2702-c34c-4c84-a092-e1aba4c6233e_732x347.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Toxic Combinations</figcaption></figure></div><p>Prioritization is present, and Sweet shows the patterns to highlight &#8220;toxic combinations&#8221; of exposed services and critical vulnerabilities. The implementation here is functional but basic. It&#8217;s also worth mentioning the biggest feature gap on the vulnerability side - the lack of agentless scanning.</p><h2><strong>Posture and Asset Management</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!z7Rk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb52b95b-0353-477c-b313-4d0a31d9bde5_1782x789.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!z7Rk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb52b95b-0353-477c-b313-4d0a31d9bde5_1782x789.png 424w, https://substackcdn.com/image/fetch/$s_!z7Rk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb52b95b-0353-477c-b313-4d0a31d9bde5_1782x789.png 848w, https://substackcdn.com/image/fetch/$s_!z7Rk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb52b95b-0353-477c-b313-4d0a31d9bde5_1782x789.png 1272w, https://substackcdn.com/image/fetch/$s_!z7Rk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb52b95b-0353-477c-b313-4d0a31d9bde5_1782x789.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!z7Rk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb52b95b-0353-477c-b313-4d0a31d9bde5_1782x789.png" width="1456" height="645" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fb52b95b-0353-477c-b313-4d0a31d9bde5_1782x789.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:645,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:103356,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/163866094?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb52b95b-0353-477c-b313-4d0a31d9bde5_1782x789.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!z7Rk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb52b95b-0353-477c-b313-4d0a31d9bde5_1782x789.png 424w, https://substackcdn.com/image/fetch/$s_!z7Rk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb52b95b-0353-477c-b313-4d0a31d9bde5_1782x789.png 848w, https://substackcdn.com/image/fetch/$s_!z7Rk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb52b95b-0353-477c-b313-4d0a31d9bde5_1782x789.png 1272w, https://substackcdn.com/image/fetch/$s_!z7Rk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb52b95b-0353-477c-b313-4d0a31d9bde5_1782x789.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Sweet includes some basic CSPM functionality, including compliance checks and hardening recommendations, but the depth is limited. Teams used to richer policy management or better search and customization will find these features underwhelming. Asset visibility is also skewed toward containerized environments, with gaps in coverage for unmanaged assets unless a sensor is deployed.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3pHo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a148c5-f348-474d-a40d-4a918759975c_448x499.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3pHo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a148c5-f348-474d-a40d-4a918759975c_448x499.png 424w, https://substackcdn.com/image/fetch/$s_!3pHo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a148c5-f348-474d-a40d-4a918759975c_448x499.png 848w, https://substackcdn.com/image/fetch/$s_!3pHo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a148c5-f348-474d-a40d-4a918759975c_448x499.png 1272w, https://substackcdn.com/image/fetch/$s_!3pHo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a148c5-f348-474d-a40d-4a918759975c_448x499.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3pHo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a148c5-f348-474d-a40d-4a918759975c_448x499.png" width="448" height="499" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c6a148c5-f348-474d-a40d-4a918759975c_448x499.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:499,&quot;width&quot;:448,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3pHo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a148c5-f348-474d-a40d-4a918759975c_448x499.png 424w, https://substackcdn.com/image/fetch/$s_!3pHo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a148c5-f348-474d-a40d-4a918759975c_448x499.png 848w, https://substackcdn.com/image/fetch/$s_!3pHo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a148c5-f348-474d-a40d-4a918759975c_448x499.png 1272w, https://substackcdn.com/image/fetch/$s_!3pHo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a148c5-f348-474d-a40d-4a918759975c_448x499.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The topology view provides a helpful visual of how services connect with the sensor showing service to service traffic. I appreciated how all meaningful AWS assets are mapped in the topology instead of only showing workloads - it was great to see my critical lambda functions grouped in with the clusters. Unfortunately, only basic data exists for workloads without the sensor installed.</p><h2><strong>API Catalog and Identity Data</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WToM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34871fd9-4580-4c18-ade0-47146204a8c0_1021x847.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WToM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34871fd9-4580-4c18-ade0-47146204a8c0_1021x847.png 424w, https://substackcdn.com/image/fetch/$s_!WToM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34871fd9-4580-4c18-ade0-47146204a8c0_1021x847.png 848w, https://substackcdn.com/image/fetch/$s_!WToM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34871fd9-4580-4c18-ade0-47146204a8c0_1021x847.png 1272w, https://substackcdn.com/image/fetch/$s_!WToM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34871fd9-4580-4c18-ade0-47146204a8c0_1021x847.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WToM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34871fd9-4580-4c18-ade0-47146204a8c0_1021x847.png" width="1021" height="847" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/34871fd9-4580-4c18-ade0-47146204a8c0_1021x847.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:847,&quot;width&quot;:1021,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:93190,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/163866094?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34871fd9-4580-4c18-ade0-47146204a8c0_1021x847.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WToM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34871fd9-4580-4c18-ade0-47146204a8c0_1021x847.png 424w, https://substackcdn.com/image/fetch/$s_!WToM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34871fd9-4580-4c18-ade0-47146204a8c0_1021x847.png 848w, https://substackcdn.com/image/fetch/$s_!WToM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34871fd9-4580-4c18-ade0-47146204a8c0_1021x847.png 1272w, https://substackcdn.com/image/fetch/$s_!WToM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34871fd9-4580-4c18-ade0-47146204a8c0_1021x847.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It&#8217;s been exciting to see API security grow into a feature of CADR, as gathering this application layer data has long been a missing point of context for understanding cloud workloads. <strong>Understanding API catalogues and regular traffic is foundational to understanding how workloads are operating</strong> and detecting application layer attacks. In testing, Sweet was able to helpfully group by either hostnames or service names to know exactly what API endpoints a service was surfacing.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yDjd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5789a83f-b663-443f-b0c4-0794c1047d4f_1790x742.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yDjd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5789a83f-b663-443f-b0c4-0794c1047d4f_1790x742.png 424w, https://substackcdn.com/image/fetch/$s_!yDjd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5789a83f-b663-443f-b0c4-0794c1047d4f_1790x742.png 848w, https://substackcdn.com/image/fetch/$s_!yDjd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5789a83f-b663-443f-b0c4-0794c1047d4f_1790x742.png 1272w, https://substackcdn.com/image/fetch/$s_!yDjd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5789a83f-b663-443f-b0c4-0794c1047d4f_1790x742.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yDjd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5789a83f-b663-443f-b0c4-0794c1047d4f_1790x742.png" width="1456" height="604" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5789a83f-b663-443f-b0c4-0794c1047d4f_1790x742.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:604,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:136628,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/163866094?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5789a83f-b663-443f-b0c4-0794c1047d4f_1790x742.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yDjd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5789a83f-b663-443f-b0c4-0794c1047d4f_1790x742.png 424w, https://substackcdn.com/image/fetch/$s_!yDjd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5789a83f-b663-443f-b0c4-0794c1047d4f_1790x742.png 848w, https://substackcdn.com/image/fetch/$s_!yDjd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5789a83f-b663-443f-b0c4-0794c1047d4f_1790x742.png 1272w, https://substackcdn.com/image/fetch/$s_!yDjd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5789a83f-b663-443f-b0c4-0794c1047d4f_1790x742.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Identity was an unexpected but strong functionality in the platform. Sweet does a good job highlighting non-human identities and associated risks thanks to its runtime visibility. It&#8217;s not building behavior-based IAM policies yet, but the foundational data is solid - especially the NHI detection</p><h2><strong>Integration and Workflow</strong></h2><p>Sweet offers the standard integrations for event forwarding, ticketing, and notifications. Nothing particularly novel here, but it covers the basics well enough for most SOC workflows. The workflow capabilities aren&#8217;t incredibly mature, but probably assume that is happening more in other tools.</p><h1><strong>Final Take</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0Zeq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9f78d01-b024-47c4-887c-2ae88423cb8e_1790x743.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0Zeq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9f78d01-b024-47c4-887c-2ae88423cb8e_1790x743.png 424w, https://substackcdn.com/image/fetch/$s_!0Zeq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9f78d01-b024-47c4-887c-2ae88423cb8e_1790x743.png 848w, https://substackcdn.com/image/fetch/$s_!0Zeq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9f78d01-b024-47c4-887c-2ae88423cb8e_1790x743.png 1272w, https://substackcdn.com/image/fetch/$s_!0Zeq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9f78d01-b024-47c4-887c-2ae88423cb8e_1790x743.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0Zeq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9f78d01-b024-47c4-887c-2ae88423cb8e_1790x743.png" width="1456" height="604" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b9f78d01-b024-47c4-887c-2ae88423cb8e_1790x743.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:604,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:153100,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://pulse.latio.tech/i/163866094?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9f78d01-b024-47c4-887c-2ae88423cb8e_1790x743.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0Zeq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9f78d01-b024-47c4-887c-2ae88423cb8e_1790x743.png 424w, https://substackcdn.com/image/fetch/$s_!0Zeq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9f78d01-b024-47c4-887c-2ae88423cb8e_1790x743.png 848w, https://substackcdn.com/image/fetch/$s_!0Zeq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9f78d01-b024-47c4-887c-2ae88423cb8e_1790x743.png 1272w, https://substackcdn.com/image/fetch/$s_!0Zeq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9f78d01-b024-47c4-887c-2ae88423cb8e_1790x743.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong><a href="https://www.sweet.security/?utm_campaign=13231219-James%20Berthoty&amp;utm_source=Jamesberthoty">Sweet Security</a> is a strong runtime detection platform, particularly for teams looking for better incident context and alert fidelity.</strong> Its ability to correlate attacks and reduce noise is a clear strength. Especially for teams looking for a simple workload protection tool to enable their SOC and Cloud Security teams to better respond to runtime alerts, they have a strong offering.</p><p>As I&#8217;ve written elsewhere, <strong>I&#8217;m not a believer in the all-in-one CNAPP Megazord</strong> that gobbles up the security budget; however, if you're looking for that full feature list CNAPP replacement, i.e. something that has a check the box offering on everything from your asset and vulnerability management, compliance posture, IaC scanning, and code security, Sweet does not have all of these capabilities. The runtime piece is more mature than most of the larger competition, but the other areas are less developed.</p><p>Rather than being a drawback, I think these solutions are especially well paired with robust application security scanning solutions that surface vulnerability findings to developers. <strong>As part of a layered approach that includes a solid ASPM or shift left application security tools, Sweet is the runtime complement to secure the applications once they&#8217;re deployed. </strong>I believe teams with cloud native architectures should adopt a <a href="https://list.latio.tech/#best-ASPM-tools">strong ASPM platform</a> alongside a <a href="https://list.latio.tech/#best-CDR-tools">runtime CNAPP (or CADR)</a> in order to get true code to cloud coverage and application protection. For larger enterprises with highly distributed environments I typically recommend separate CSPM, CADR, and ASPM platforms to allow each to really get operationalized to its fullest extent. </p><p><strong>Overall, Sweet is a great tool for teams looking to get runtime protection of their cloud environments</strong>. It&#8217;s not the best tool for teams looking primarily for basic cloud asset visibility and vulnerability management, or for establishing code to cloud pictures for vulnerability remediation; however, I don&#8217;t want to sell the CSPM features short either, they&#8217;re pretty good. My practitioner preference has always been keeping these tools distinct where possible: CSPM, ASPM, and CADR. I would certainly include Sweet in any evaluation for runtime oriented cloud security capabilities.</p><p>Let&#8217;s back up and answer the question, &#8220;what is a runtime CNAPP?&#8221; The answer is a tool that helps you deeply understand your cloud workloads, and that you can trust to find attackers in your environment. And that&#8217;s Sweet.</p>]]></content:encoded></item><item><title><![CDATA[Latio on the Record Episode 4 - What's the Deal with Hardened Containers]]></title><description><![CDATA[Explaining what containers are and aren't, and how to use them]]></description><link>https://pulse.latio.tech/p/latio-on-the-record-episode-3-whats</link><guid isPermaLink="false">https://pulse.latio.tech/p/latio-on-the-record-episode-3-whats</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Tue, 03 Jun 2025 13:38:42 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/165014659/9f94d751f7eaabf4ad0602bd3e86f2ff.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this conversation, <a href="https://www.linkedin.com/in/james-berthoty/">James Berthoty</a>, <a href="https://www.linkedin.com/in/hardamoncharrah/">Charrah Hardamon</a>, <a href="https://www.linkedin.com/in/azenla/">Alex Zenla</a>, and <a href="https://www.linkedin.com/in/ariadneconill/">Ariadne Conill</a> discuss the complexities of container security, focusing on low CVE images, the evolution of software distribution, and the importance of runtime protection. They explore the challenges security teams face with vulnerabilities in container images and the need for a holistic approach to security. Edera's unique approach to runtime security is highlighted, emphasizing the importance of reducing the blast radius of potential exploits and the role of AI in shaping the future of security.</p><p><strong>Takeaways</strong></p><ul><li><p>Container security is crucial in today's software development.</p></li><li><p>Low CVE images help reduce known vulnerabilities.</p></li><li><p>Docker's ease of use contributed to its widespread adoption.</p></li><li><p>Runtime protection is essential for securing containers.</p></li><li><p>Understanding the architecture of containers is key to security.</p></li><li><p>Compliance frameworks often drive security practices.</p></li><li><p>AI poses new challenges for security teams.</p></li><li><p>Holistic security approaches are necessary for effective protection.</p></li><li><p>Regularly rebuilding and redeploying images is vital for security.</p></li></ul><p><strong>Chapters</strong></p><p><strong>00:00 </strong>Introduction to Container Security</p><p><strong>01:45 </strong>Understanding Containers and Their Functionality</p><p><strong>07:05 </strong>The Evolution of Software Appliances</p><p><strong>08:49 </strong>The Rise of Docker and Its Impact</p><p><strong>12:45 </strong>Addressing Vulnerabilities in Container Images</p><p><strong>16:00 </strong>Runtime Security and Unknown Vulnerabilities</p><p><strong>18:26 </strong>The Need for Coupling Security Solutions</p><p><strong>21:31 </strong>The Misconception of Containers as VMs</p><p><strong>24:56 </strong>The Importance of Regular Redeployment</p><p><strong>26:52 </strong>Building Secure Software Components</p><p><strong>28:37 </strong>Tools for Software Composition</p><p><strong>30:42 </strong>The Role of Base Images in Security</p><p><strong>31:17 </strong>Runtime Protection with Adara</p><p><strong>36:38 </strong>Micro-VMs and Container Security</p><p><strong>40:27 </strong>The Impact of AI on Security</p><p><strong>45:23 </strong>The Future of Secure Computing</p>]]></content:encoded></item><item><title><![CDATA[LotR Episode 3 - Digging into eBPF for Security]]></title><description><![CDATA[Watch now | Date: May 12, 2025]]></description><link>https://pulse.latio.tech/p/lotr-episode-3-digging-into-ebpf</link><guid isPermaLink="false">https://pulse.latio.tech/p/lotr-episode-3-digging-into-ebpf</guid><dc:creator><![CDATA[James Berthoty]]></dc:creator><pubDate>Mon, 12 May 2025 16:47:25 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/163403456/b9ef2d6e1174cd213e480fa17de49078.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><strong>Date:</strong> May 12, 2025<br><strong>Guest:</strong> Daniel Pacak (Software Engineer, <a href="https://www.miggo.io/">Miggo</a>)<br><strong>Hosts:</strong> James Berthoty, Charrah Hardamon<br><strong>Topic:</strong> Building Real Runtime Security with eBPF</p><p>In this episode, we go deep on eBPF and what it <em>actually</em> takes to build reliable, performant runtime detection, beyond the buzzwords. James and Charrah are joined by Daniel Pacak, a longtime engineer in the cloud security space whose work spans Aqua Security, Cycode, RAD Security, and now Miggo. Daniel brings years of firsthand experience building eBPF sensors and walking the line between kernel-level complexity and practical detection coverage.</p><p>We open with Daniel&#8217;s journey into runtime security, beginning with his early work on Aqua&#8217;s Tracee project and continuing through multiple startup roles where he helped shape eBPF-based detection systems. He shares candid insights about the challenges of kernel instrumentation, the tradeoffs of performance versus visibility, and why function-level detection is so difficult but increasingly important.</p><p>Key discussion points include:</p><ul><li><p>Why runtime protection historically underperformed on Linux</p></li><li><p>How vendors differ in their approaches to eBPF integration</p></li><li><p>The technical realities behind stack unwinding, kernel hooks, and symbolization</p></li><li><p>What ADR (and CADR) really means from a backend detection perspective</p></li><li><p>Common misconceptions around eBPF and what it can (and can&#8217;t) do</p></li><li><p>Why the industry lacks a common SDK or standard framework for building sensors</p></li><li><p>Practical advice for evaluating vendors&#8217; claims and assessing impact in real-world clusters</p></li></ul><p>Daniel also walks through his thinking on why some tools overload the node with too much local processing, and what a healthier architecture looks like, particularly for teams focused on tuning alerts and scaling reliably.</p><p>The episode closes with a reminder that learning eBPF is a long road, but one with real payoffs for engineers interested in modern detection systems. And for security teams trying to figure out if eBPF tooling fits into their environment, Daniel gives straightforward guidance: test it in a real cluster, give it time to run, and measure both what it detects and how it performs.</p><p>Follow Daniel&#8217;s work on <a href="https://github.com/danielpacak">GitHub</a> or <a href="https://www.linkedin.com/in/pacakdaniel/">LinkedIn</a>.</p>]]></content:encoded></item></channel></rss>