Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding continuous threat exposure management (CTEM)

Continuous threat exposure management, or CTEM, is a five-stage program framework for continuously reducing real-world security exposure. It builds on vulnerability scanning by adding risk-informed prioritization, validation of exposure conditions and control effectiveness, and cross-team mobilization to drive remediation.

What endpoint security management actually is and what it isn't

Endpoint security management is the centralized IT and security discipline of discovering, monitoring, and controlling all devices on an enterprise network, including laptops, servers, mobile devices, and IoT hardware, to reduce unauthorized access and limit how far threats can travel once inside.

Mini Shai-Hulud supply chain attack: Why this campaign changes how defenders should think about trusted software

The Mini Shai-Hulud supply chain attack compromised more than 170 packages across npm and PyPI, including packages from TanStack, Mistral AI, and Guardrails AI, by hijacking legitimate CI/CD publishing workflows to distribute malicious versions that still carried apparently valid provenance signals.

10 steps to trusted, validated autonomous IT

Because IT security no longer moves at human speed, endpoint management can no longer be seen as a background IT function. It’s now the front line and critical as ever. Attackers move fast, and AI makes them faster. Organizations can’t keep validating exposure and fixing issues the old way. Endpoint management has to run at machine speed because every manual handoff and every delayed exception adds more risk.

Automating the Service Desk: Possible NOW - Tanium Tech Talks #155

Meet the autonomous service desk - powered by live endpoint intelligence. See how ServiceNow NowAssist + Tanium deliver agentic triage, real‑time diagnostics, and guided remediation the moment an incident hits. Agentic triage kicks off instantly when an incident is created Real-time endpoint intelligence beats assumptions every time Confidence‑scored root cause analysis reduces investigation from hours to minutes The power of bounded autonomy (strong guardrails + powerful automation)