Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Build an NPM Package for ESM and CJS

In this video, we show you how to build an NPM package that is compatible with ESM and CJS. Have you built an NPM package before? if so, share it down below in the comments! Snyk helps you find and fix vulnerabilities in your code, open-source dependencies, containers, infrastructure-as-code, software pipelines, IDEs, and more! Move fast, stay secure.

Balancing Trust and Control: Effective Phishing Protection Strategies

Discover why balancing trust and control is essential in cybersecurity. Our hosts discuss the complexities of protecting against phishing attacks, especially with advanced tools like ChatGPT that make scams harder to detect. Learn how combining trust with effective controls can help detect anomalies and safeguard your organisation against targeted attacks.