Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why the Target Breach Wasn't a Detection Failure - It Was Prioritization | Garrett Hamilton at UCI

Nicole Perlroth asks Garrett how Reach's involvement would have impacted the breach with Target. Attackers came in through a third-party HVAC vendor. Credentials were compromised. Alerts fired. But nothing rose to the level of urgency it deserved. As Garrett Hamilton explains at UCI, this is where security breaks down—not detection, but prioritization. Most teams keep investing in reacting faster inside the SOC. The harder (and more effective) shift is upstream: reducing the exhaust before it ever hits the console.

Why Traditional Threat Detection Is Failing Security Teams

As attack surfaces continue to expand, many security teams are finding that traditional detection methods can’t keep up. In this clip, the discussion centers on why legacy security tools struggle in modern environments — from the growing complexity of networks to the sheer volume of alerts teams are expected to investigate. When alerts are handled manually and without sufficient context, it becomes difficult to understand which threats are most critical and how quickly to respond.

AI Compliance Training: EU AI Act & 90-Day Implementation Strategy

Executive Summary: A technical briefing on navigating the AI compliance landscape, focusing on the EU AI Act, US federal mandates, and state-level regulations. This session provides a structured 90-day roadmap for AI system governance, risk mitigation, and role-based training deployment. Key Knowledge Domains.

Tame the Vault Sprawl: Bring All Your Secrets Under Control in 60 Seconds

This 60-second video highlights the growing challenge of secret sprawl—developer-created vaults, duplicate credentials, and inconsistent security policies scattered across cloud environments. It shows how this fragmentation increases risk, complicates compliance, and opens the door to breaches. The video introduces CyberArk Secrets Hub as the solution: a centralized, policy-driven platform that unifies visibility, enforces standards, automates rotation, and preserves existing cloud-native and HashiCorp workflows. The result? Simplified oversight, stronger security, and audit-ready operations.

Secrets in the Machine: Preventing Sensitive Data Leaks Through LLM APIs

In this webinar, we break down a simple but increasingly common problem: secrets leak wherever text flows, and modern LLM apps and agentic workflows are built to move text fast. We walk through concrete demos showing how API keys and passwords can surface through RAG-based assistants when secrets accidentally live in knowledge bases (tickets, docs, internal wikis). We also show why “just harden the system prompt” isn’t a reliable fix, and how output-only redaction can be bypassed (for example by simple formatting/encoding tricks). Most importantly, we explore real-world agent architectures.

Brivo Access: How to Set up Becklar 24/7 Central Station Monitoring

Managing your security is easier than ever with Brivo Access and Becklar Central Station Monitoring. This how to video will show you how to enable and set up 24/7 monitoring for your site. Explore the future of security and smart technology with Brivo. Our content delves into innovative solutions that empower businesses and individuals to create safer, more connected environments. Don't forget to like, share, and subscribe to stay updated on the latest trends in access control and smart space management.