Mini Shai-Hulud Strikes PyTorch Lightning and intercom-client: Inside the Cross-Ecosystem Supply Chain Attack
The Shai-Hulud Worm Returns: New npm Supply Chain Attack Compromises SAP Packages
Latest news
How to
Get to know us
Our partner
Scaling AppSec Accuracy with a Two-Person Team
Scaling AppSec Without Scaling Headcount: How Rapyd Used Kodem to Shift from Volume to Impact
Immerse yourself in the latest cybersecurity developments to gain valuable insights in today's dynamic threat landscape.
You are invited to a private whiskey tasting at Republic in Dallas.
Security moves fast. Attackers move faster.
In this session we’ll examine how this architecture makes existing WAF deployments significantly more effective.
Top technology leaders will provide strategic and visionary insights into the technology Supercycle of innovation, disruption, and invention.
Where the top global CISOs and the top InfoSec innovators gather each year.
This one-day event incorporates breakouts with IANS Faculty, spotlight sessions on emerging technologies, and opportunities to network with your peers.
Adversarial Intelligence: Redefining Application Security Through the Eyes of an Attacker
We present specific findings Kodem uncovered in Claude Code. Both issues highlight how LLM-based coding tools introduce new misconfiguration and input-handling risks.
Cyber Security Conference presented by the Technology Committee of the Tyler Chamber of Commerce
From input-handling flaws to crashables: Security lessons from LLM-based coding tools
17th Annual Boston C-Level Technology Leadership Summit
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.