Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud Workloads - Containers - Tanium Tech Talks #118

Today we explore Tanium's new support for containers. It goes way beyond basic visibility. See these use cases across Tanium's popular modules: Interact - query containers across registries just like other endpoints Asset - four new reports for container inventory, including SBOM, rogue, and privileged containers Comply - scan for container image vulnerabilities, including SBOM Enforce - implement security guardrails with new container policies Reporting - a bonus Cloud Workloads dashboard.

Disparate Data to Unified Risk Insights: The Role of Asset Correlation in Vulnerability Management

In this webinar, Adam Dudley and Aaron Attarzadeh from Nucleus discuss the critical role asset correlation plays in vulnerability management. They dive into how organizations can unify disparate asset data to gain clearer, more actionable risk insights. They explore the challenges of managing vulnerabilities in today's complex environments, with a focus on metadata integration, asset correlation, and how to manage data from multiple scanners and sources.

API ThreatStats Report 2025: The Convergence of AI and API Security

This is it! The 2025 Annual API ThreatStats Report! The Wallarm Research team has collected and analyzed all the API threat data for 2024 and produced this annual report, shining a spotlight on the rising threat of API attacks targeting AI applications. The latest report explores the top API threats, identifies key trends, and provides actionable insights that can help you strengthen your API Security program, with an emphasis on identifying and protecting your AI applications from API security issues. This report includes an update to our dynamic API Security Top 10 as well. In this webinar, you will learn about.

Answers to FAQs About API Security with Wallarm #SQLInjection #APIAbuse #AttackExamples

Learn how Wallarm integrates with Kubernetes and psyllium for API security and observability using eBPF. Explore the differences between stateful and stateless attacks and real-world examples like SQL injections and API abuse. Discover why context is essential in defining attacks and how Wallarm adapts to various scenarios.