Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

7 factors to consider before deciding the right PAM strategy for your enterprise

Over the years, privileged access management has evolved from a nice-to-have component of identity security into a critical business necessity. Whether you're looking to adopt a PAM strategy for the first time or evaluating alternatives to your current setup, selecting the right approach for your enterprise requires careful consideration. Join Ganesh, Global Head of Support Services at ManageEngine, to explore 7 key factors to consider before deciding on the best PAM strategy for your enterprise.

Nx npm Malware Explained: AI Agent Hijacking

Nx npm malware (Aug 2025): attackers published malicious Nx packages that weaponized AI coding agents (Claude Code, Gemini CLI, Amazon Q) via a postinstall script to inventory sensitive files and exfiltrate sensitive data to public GitHub repos named “s1ngularity-repository-*.” We break down what happened, affected versions, and how to check + respond (rotate credentials, hunt IoCs, and more). Resources.

Optimizing the SOC: Leveraging AI and automation for modern threats

The Security Operations Center (SOC) is the nerve center of an organization's defenses, but its efficiency and effectiveness are often limited by the growing volume and complexity of threats. By leveraging AI-driven threat detection and automated incident response, security leaders can optimize their SOC to respond faster and smarter. For CISOs, this means not only protecting the organization from current threats but also future-proofing defenses against an increasingly sophisticated threat landscape.

How To Boost Your Internet Security: Simple Steps! #appsec #infosec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Telemetry Alone Won't Save You: Why Action Matters in API Security #telemetry #appsec #infosec

Collecting logs and metrics isn’t enough real API security requires actionable insights and the ability to respond fast. In this clip, Wallarm and Oracle experts explain why telemetry without a clear response plan is useless, and how building detection into your incident response process makes the difference between stopping threats and just observing them.