Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Your Data Loss Prevention Tool Misses Every Single Day

In this video, you will learn why legacy DLP tools go blind when sensitive data is copy-pasted into generative AI tools, how Data Lineage fingerprints information at its origin to track it across transformation within an environment, and how operating system-level monitoring eliminates the encryption blindness that limits browsers and firewalls. You will also see how to build context-aware paste policies that allow productive AI use while blocking high-risk data flows from sources like source code repositories, Salesforce, and internal wikis.

The Exploitability Intelligence Gap: What Security Teams Can Know Before CISA KEV

In this webinar, Nucleus Security CEO Steve Carter and Product Marketing Lead Tally Netzer break down the growing “exploitability intelligence gap” and what it means for modern vulnerability and exposure management programs. Drawing from six months of research and real-world vulnerability data, they explore how attacker timelines have compressed, why traditional reactive workflows are struggling to keep pace, and where organizations are missing critical signals before exploitation begins.

Ep. 57 - Russia's Proxy Bridge: BlackCat, Scattered Spider, and the Kremlin

In Part 4 of our Russian intelligence series, host Tova Dvorin and Adrian Culley map the proxy bridge between Western teenage hackers and Moscow. BlackCat (ALPHV) ransomware-as-a-service is the operational hinge: Scattered Spider breaks in, BlackCat encrypts, and the FSB watches the dashboard. Hear how the Kremlin earns plausible deniability, why a $115M extortion stream self-funds Russian intelligence, and what MI6's new "hybrid shadow war" warning means for defenders simulating Rust-based ransomware in their own networks.

AI Is Replacing Security Dashboards (Headless Cloud Security Explained)

AI is changing cloud security—and dashboards might be next to go. In this video, we introduce headless cloud security: a new model where AI agents, not humans, operate security systems. Instead of dashboards and manual triage, security becomes API-driven, automated, and built for autonomous execution. This shift redefines DevSecOps, cloud security, and AI security workflows—moving humans from operators to orchestrators.

Incident Response: Keeping Cool When Everything's on Fire

The DevOps revolution broke down the traditional silos between development and operations, fundamentally reshaping how we build and maintain software. But with this evolution came an inevitable, and often stressful, reality for many engineers: being on-call and responding to incidents. In this session, Daljeet Sandu will explore how on-call has evolved in recent years, highlight proven best practices, and share insights into the future of incident response in DevOps.

Reviewing Malicious PRs at Scale with AI

As AI coding assistants accelerate software development, the volume of pull requests at Datadog has grown to nearly 10,000 per week, increasing the risk that malicious changes slip through due to review fatigue. To address this, Datadog built BewAIre, an LLM-powered code review system designed to identify malicious source code changes introduced by threat actors. By reducing approval fatigue for developers while increasing friction for attackers, BewAIre guides human reviewers to the areas where judgment matters most, without slowing developer velocity.

Your Backups Know More Than You Think

You may not be aware of how valuable your backups are: they can contain extremely valuable information that leaves a record of what your other security tools may have missed. This is just one of the many interesting tidbits Kyle Fiehler provided on his recent episode of Data Security Decoded. Kyle also explains how threat actors exploit backup blind spots, why identity and recovery are now prime attack surfaces, and how security leaders can rethink MTTR.

How to Set Up 2FA for Jira Service Management Portal Customers | miniOrange

Looking to enforce Two-Factor Authentication (2FA) for your JSM portal-only customers? In this video, we walk you through the complete setup of 2FA settings using the miniOrange Cloud 2FA app for Jira Service Management (JSM), covering admin configuration, customer management, and the end customer enrollment flow. What you will learn in this video Timestamps Enforcing Two-Factor Authentication on your JSM portal with miniOrange helps organizations.