Despite their importance, developer endpoints are the blind spot in most organizations 😬 This is a concern for every company because developers require unusually privileged access, which makes them vulnerable to unusual attacks. Just to name a few: ・AI misuse: MCP servers, Hugging Face models, and prompt injection attacks ・Supply chain exploits: compromised packages like the NX attack leaking tokens ・Extension manipulation: malicious IDE or browser extensions with privileged access Point solutions exist such as NPM wrappers, gateways, secure browsers, and custom patching policies. But given the requirements and workflows, most devs won't bother 🙂↔️ 🪄 The fix ✦ Teams need Developer MDMs vs Traditional MDMs ✦ Endpoint visibility should come from existing agents to give security teams control and creating the native experience developers need It's time for MDMs to work with developers and not against them. Check out our blog to learn more about what we're calling ✨Developer MDMs✨ https://lnkd.in/diwQXeUT
Latio
Computer and Network Security
Raleigh, NC 1,219 followers
The only analyst firm that tests products before we write about them, so you can find the right tools for your stack.
About us
Our mission is to make choosing the right tools easier, faster, and more reliable. That’s why we test every product before we share our insights, so teams get recommendations grounded in hands on experience, rather than opinions.
- Website
-
https://latio.com
External link for Latio
- Industry
- Computer and Network Security
- Company size
- 2-10 employees
- Headquarters
- Raleigh, NC
- Type
- Privately Held
- Founded
- 2023
- Specialties
- devsecops, cybersecurity, and cloudsecurity
Locations
-
Primary
Raleigh, NC 27612, US
Employees at Latio
Updates
-
🎙️ Need a way to spend an hour on September 30th? Join Latio's James Berthoty and RAD Security's CTO, Jimmy Mesta, as they discuss all things AI and security products. 📅 When: Tuesday, September 30th at 11am PT ⏰ 60 minutes of live and interactive conversations 👉 Save your spot here: https://lnkd.in/gu-3MQdS
-
-
🎙️A new episode of Latio: On the Record is out and this one is featuring Jonathan R. (if you haven't met him yet, he's a certified security and data boss) The TL;DW 🔸 SIEM may not be dead after all 🔸 Security engineering 🙅 data engineering 🔸 Picking security tools should be defined by specific use cases and not steak dinners (sometimes they're ok, when Latio is invited too🐄) ✨ Tune in to episode 9 now ✨ https://lnkd.in/eBtcVf5B
-
💫 The Latio 2025 AI Security Acquisitions Guide just dropped 💫 In this guide we unpack six major acquisitions and how they differ in use cases and value. While each are interesting, there were two that stood out as bringing clear and immediate value propositions to their current customers. The key takeaways: - Not all acquisitions are created equal - Build vs buy but make it worth millions - Brand matters especially when the hype is built on true customer value ✨ Read the guide here: https://lnkd.in/eZTkEdGT
-
-
Last week the The New Stack published Latio's 5 key takeaways from Black Hat and Defcon with the goal of helping practitioners navigate what’s really happening. The TL;DR: 🌶️ CTEM is the new CSPM 🔍 Runtime solutions add a much needed layer of visibility 🔥 The SOC is so hot right now 🔮 The code security divide Is getting clearer 😰 Defining what AI security is remains a massive challenge Read our takes here 👉 https://lnkd.in/efWy-dGS
-
-
What happens when Joseph Barringhaus 🐙 and James Berthoty join forces with RAD Security, Sysdig, Sweet Security, ARMO, Upwind Security, and Stream.Security? 🎁 You get everything you wish a vendor demo was. 🕘 Today at 9am CT, see how leading CDR platforms actually work; 🙅♂️ no sales scripts, and no pressure allowed. Save your spot now 🎫: https://lnkd.in/egeTFEUJ
-
-
For many teams answering, "which type of runtime reachability is the right kind?" isn't easy. In James Berthoty's latest article for The Hacker News, he breaks down everything teams need to know about runtime reachability. The TL;DR: ✦ Not all runtime reachability is the same ✦ There are really three types: Loaded, Network, and Function execution ✦ Depending on the type of vulnerability, there are pros and cons to each approach, but function level provides by far the most true positive value 👉 Check it out here: https://lnkd.in/gVXNkQ3N
🚨 Most “critical” CVEs aren’t even exploitable in your app. Security teams are drowning in false positives—because most scanners ignore whether the vulnerable function actually runs. Function-level runtime reachability changes everything. Here’s what it gets right ↓ https://lnkd.in/gVXNkQ3N —by James Berthoty, CEO of Latio.
-
-
🎙️ Join Chris H. and James Berthoty tomorrow as they dive into the Latio AI Security Market Report that covered everything from: ✅ AI adoption trends ✅ AI security Needs ✅ AI attack and risk types to watch out for ✅ Current AI security tools leaders that teams should be paying attention to ✨ Save your seat ✨: https://lnkd.in/gdtJnQ2M
-
-
After months of work, the 2025 Latio AI Security Report is live! You can check out the first five pages for free, or subscribe to download the entire 45 page report. Congratulations to all of the innovators and leaders! https://lnkd.in/e9sRxcrB
-
-
Latio: on the Record is live now on Spotify and Apple Music! In this first episode we do some real talk about cloud runtime security, and if it's finally the time for it to shine! https://lnkd.in/e3YvzPWS