Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Meet GitGuardian's AI Assistant: Natural Language Queries Across All Your Incidents

See how the GitGuardian Assistant helps teams investigate, understand, and remediate secret incidents directly from the GitGuardian workspace. In this preview, Mathieu and Dwayne walk through how the assistant uses incident context, workspace details, and GitGuardian documentation to answer questions, suggest next steps, and help manage incidents through natural language. It can explain threat patterns, assess scope and impact, recommend remediation steps, assign incidents, update tags, and propose changes to incidents.

How Attackers Use Developer Machines to Breach the Software Supply Chain - May 07, 2026

In April, three major supply chain campaigns hit npm, PyPI, and Docker Hub in just 48 hours, and while the ecosystems were different, the objective was the same: steal credentials from developer environments and CI/CD pipelines. The malware targeted API keys, cloud credentials, SSH keys, GitHub tokens, npm tokens, environment variables, and more, turning developer machines and build systems into high-value credential vaults for attackers.

The Partnerships Taking on AI Security: Daniel Bernard, CrowdStrike Chief Business Officer

The previous episode of the Adversary Universe podcast explored the “vuln-pocalypse” and the implications of advanced AI models accelerating vulnerability discovery and exploitation. Now, we’re diving into how companies are working together to face these evolving security risks. CrowdStrike Chief Business Officer Daniel Bernard spends much of his time talking with partners and customers about how to address their growing concerns: Is their business protected? Do they know which vulnerabilities are in their environment? What do they do about them?

Episode 14 - Harvest Now, Decrypt Later: The Shift to Post-Quantum Cryptography

The emergence of quantum computing has introduced a definitive expiration date for classical encryption, fueling a "harvest now, decrypt later" strategy among sophisticated nation-state actors. In this episode, Vince Stoffer joins Richard Bejtlich to demystify Post-Quantum Cryptography (PQC) and explain why organizations must move beyond a "set it and forget it" mentality regarding their encryption standards.

The Hackers Who Left Their Entire Playbook Online

A ransomware group called Warlock tore through more than 60 organisations in six months, targeting the nuclear energy, aerospace, and government sectors. They chain zero-days and neutralise antivirus software using signed Chinese drivers. This is how they operate and how the Sophos CTU tracked them across eleven incidents to expose their full playbook​

Stablecoin Payments in APAC: What Institutions Need to Know

Stablecoin transaction volumes have hit $33 trillion. Hong Kong just issued its first stablecoin licenses. In this panel from Fintech Fireside Asia, leaders from Fireblocks, Coinbase, FOMO Pay, and AWS break down what's actually happening on the ground across APAC: real use cases, shifting risk models, and where institutional adoption goes next. Panelists: Dan Sleep, Head of Business Solutions, APAC, Fireblocks Hassan Ahmed, Country Director Singapore, Coinbase Zack Yang, Co-founder, FOMO Pay Naveen Gupta, Head of Business Development, Payments, APJ Leader, AWS.

Page Edit Support for External Users with Secure Share for Confluence Cloud | miniOrange

Want to allow external users to edit shared Confluence pages securely? In this video, we walk you through the Page Edit feature in the miniOrange Secure Share app for Confluence Cloud, showing how to create a secure share link with edit permissions and how external recipients can edit page content directly from the shared link.

How Banks Are Using Stablecoins, Custody & Tokenization in 2026

The 4 digital asset use cases banks are monetizing in 2026: custody, stablecoin transaction banking, trading and brokerage, and tokenization. John Hallahan, Director of Business Solutions and Advisory for EMEA at Fireblocks, walks through how leading banks are building a single horizontal infrastructure stack to deliver across all four use cases, with real customer examples from BNY, ABN AMRO, Revolut, Banking Circle, JPMorgan, Citi, and DBS.