Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing The Future: Cloudflare's Implementation of Post-Quantum Cryptography - Michiel Appelman

Explore how Cloudflare’s Post-Quantum Cryptography (PQC) capabilities are future-proofing enterprise security. Learn how we’re integrating PQC across our network to safeguard data against quantum threats, ensuring businesses stay protected in an evolving cryptographic landscape—without compromising performance or scalability.

Elastic Security Explained: Transparency, AI, and the Future of Threat Hunting

Elastic’s James Spiteri joins John Hammond to dive deep into the evolution of Elastic Security, from the ELK stack’s early days to today’s full-fledged, unified SIEM, XDR, and cloud security solution powered by agentic AI and automation. They discuss free tools, open detections, and how Elastic is making cybersecurity more accessible and collaborative for everyone.

The Hidden Costs of Security Stack Consolidation (That Vendors Don't Mention)

Is your security stack making you safer or just adding to the chaos? Welcome to Razorwire, the podcast where we unravel the mess, myths and market realities behind today’s cybersecurity challenges. I’m your host Jim and in this episode, I’m joined by our favourite regulars Oliver Rochford and Richard Cassidy to tackle a topic that irritates every CISO: the security solution stack. We discuss the big questions about vendor motivations, tool sprawl and why consolidation so often promises more than it delivers.

VM Backup & Restore on Spectro Cloud | Live Demo for Kubernetes & KubeVirt

Watch a step-by-step live demo of how to back up and restore KubeVirt-based VMs using CloudCasa on Spectro Cloud. This walkthrough covers: Multi-tenant access VM backup workflow with CSI & non-CSI storage Policy-based scheduling & snapshot safe lock Full VM restore with namespace transform Post-restore actions and validation in Palette UI Whether you're running VMs on-prem and migrating to the cloud or need robust Kubernetes backup & disaster recovery, this demo shows you how to do it the cloud-native way.

XDR meets AIOps for Faster AI-Driven Detection and Resolution

Discover how Cato Networks helps you respond to security and networking issues quickly, easily and efficiently, in one place, with the AI power of Cato XOps. Watch this demo to see how XOps brings together XDR and AIOps to cut through huge volumes of events and alerts and provide one place to see what’s important, to investigate issues, and to mitigate threats quickly - across networking and security.

Decipher Me. What Hack Can You Detect?

What do people love more than secrets? Deciphering them. Join Etay Maor, founding member of Cato CTRL and chief security strategist at Cato, as he exposes the hidden mechanics behind AI prompt injections. From the secret codes of espionage to the subtle tricks of modern cybercriminals, this session connects the dots between history’s ciphers and today’s AI vulnerabilities. Because every secret has a pattern—if you know where to look.

Ep. 7 - You've Just Run a Penetration Test, What's Next Beyond Pen Testing

In this episode, you'll learn: What happens after a traditional penetration test? In this episode, host Tova Dvorin is joined by Adrian Culley, Senior Sales Engineer and EU lead at SafeBreach, to explore the critical evolution from legacy pentesting to continuous, automated red teaming (CART) and breach and attack simulation (BAS).