Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Agentic Era: The Myths and Realities of It All

After four sessions covering the technical realities, business imperatives, and security challenges of agentic AI, Salt Security’s Co-Founder and CEO Roey Eliyahu, and Salt's CMO Michael Callahan, come together for an unfiltered conversation about where the industry actually stands and where it's headed. The gap between AI ambition and operational readiness has never been wider.

How to mitigate CVE-2025-32433

A critical Erlang SSH vulnerability (CVE-2025-32433), also known as Chainbreaker, allows attackers to exploit pre-auth SSH behavior for remote code execution. In this video, we break down exactly what security teams need to do — from immediate mitigation to long-term prevention. What you’ll learn in this video: How to mitigate CVE-2025-32433 by upgrading Erlang OTP (27.3.3 / 26.2.5.11 / 25.3.2.20)

The Deep Dive | Optimize Your Workflow: New Admin Navigation 12.19.2025

Join us for a detailed review of the Admin Portal navigation update. We will outline the implemented changes, the design rationale, and the feature roadmap. Participate in a live Q&A to submit your feedback and get your implementation inquiries addressed by our team.

Agentic AI and Shadow APIs: Why SecOps Needs Specialization Now

Agentic AI and Shadow APIs: Why SecOps Needs Specialization Now APIs are rapidly becoming the core “language” of AI, and when agentic AI can generate its own APIs, the security stakes rise significantly. In this clip from the A10 Networks discussion, “APIs are the Language of AI – Protecting Them is Critical,” A10 security experts Jamison Utter and Carlo Alpuerto unpack why specialized skills and tools are now essential for modern security operations teams.

CVE-2025-10573: Stored XSS in Ivanti EPM

A critical stored XSS vulnerability (CVE-2025-10573) in Ivanti Endpoint Manager lets attackers poison the admin dashboard with malicious scripts, leading to session hijacking and device compromise. AppTrana blocks these malicious scan submissions at the edge, preventing stored XSS payloads from ever reaching the EPM dashboard, even before patching.

Create Highly Specific File Classifiers with Nightfall's Prompt-Based AI. No Regex Required

Many sensitive documents don’t fit cleanly into standard categories, and traditional approaches like regex or broad classifiers often create noise and false positives. In this video, we walk through how to use Nightfall’s prompt-based file classifiers to detect business-critical documents based on intent, not brittle patterns or custom model tuning.

Risk Acceptance vs Risk Exposure: Making Smarter Security Investments

Before investing in new security tools, it’s critical to understand what your current stack is actually delivering. Barmak Meftah spoke about the importance of baselining existing investments to truly grasp risk acceptance versus real risk exposure. Without that foundation, new acquisitions lack context and are often driven by trends rather than necessity. Smarter decisions come from understanding:︎ What is already deployed︎ How it is configured︎ Where exposure persists.

BlackGirlsHack: Building a community and impactful legacy with Rebekah Skeete [277]

On this episode of The Cybersecurity Defenders Podcast we speak with Rebekah Skeete, Executive Director and CEO of BlackGirlsHack Foundation. Rebekah dives into how BGH is helping to increase diversity in cybersecurity by bridging the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity.