Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Risk Governance Suite - office hours part 1

Kovrr’s new AI Risk Governance Suite gives enterprises the visibility, structure, and measurable control needed to manage GenAI responsibly across its full lifecycle. Join us for Office Hours: Part 1, where Or Amir will walk through the first three modules of the suite—showing how enterprises can gain real-time oversight and quantifiable insight into their AI landscape: Discover how these capabilities help enterprises align innovation with accountability—building a defensible foundation for responsible GenAI adoption.

Build a Context-Aware DLP Entity Detector Without Regex (Prompt-Based Detection Demo)

See how to build a prompt-based custom entity detector in Nightfall that understands context, not just patterns. Using a real healthcare example, you’ll see how prescription numbers are detected accurately while similar-looking data like purchase order numbers are ignored. You’ll see: Why regex breaks down in real workflows How prompt-based detection reduces false positives Creating a custom detector with positive and negative examples Deploying it to Slack and validating results across files.

Secure AI coding with the 1Password hook for Cursor Agentic Coding IDE

In this video to learn how the 1Password hook for Cursor keeps your environment files secure while using AI-powered development in Cursor. See how 1Password Environments prevent plaintext API keys, hardcoded tokens, and long-lived secrets from ever touching your repo or disk.

Bug bounties and broken CVEs with Bryan Brake

Join us for this week's Defender Fridays as we explore bug bounty programs, vulnerability management, and the complexities of the CVE system with Brian Break, a veteran security professional with twenty years of experience across endpoint security, consulting, and product security. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

ICS phishing with Jon Gaulding

Join us for this week's Defender Fridays as we explore ICS phishing and calendar invite abuse with John Gaulding, Full Stack Engineer at Sublime Security. John examines how attackers are weaponizing calendar invites to bypass email security defenses and create persistent attack vectors. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

World Class AI-Enabled Cybersecurity Conference - IdentityShield Summit 2026

Discover the future of Cybersecurity at IdentityShield Summit 2026 We’re inviting you to be a part of one of the biggest and boldest AI-driven cyber events, where you’ll deep dive into innovations, witness panels. It's a premier two-day event that brings together 5000+ global IT leaders, CISOs, CTOs, developers, and cybersecurity professionals. Get ready for an action-packed 2-day event! At this event, you can.

This or That. CEO Shares Favorite Cybersecurity Books in SecurityScorecard Bracket #cybersecurity

This or That. Favorite Books of SecurityScorecard Bracket, Cyber Edition is BACK – but this time it's Security Books! �� CEO and Co-Founder of SecurityScorecard Aleksandr Yampolskiy has another list of books you'll want to grab for some winter break reading and relaxation. Which ones are you hoping end up in your stocking this year? Drop a comment with your favorites and recommendations below.