Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Breaking into Cybersecurity with Motti Tal: From Code to Cyber Strategies

In this episode of Breaking Into Cybersecurity's latest episode, featuring Motti Tal, CSO at Memcyco. Motti shares his journey from studying computer science at Tel Aviv University to programming for the Israeli Navy and eventually moving into software and cybersecurity. He discusses the evolution of his career, how AI influences critical thinking, and the importance of innovative thinking in cybersecurity.

Graylog SIEM on AWS | Smarter Security Without Compromise

Choosing a SIEM doesn’t have to mean trade-offs. This video shows how Graylog SIEM on AWS delivers fast detection, predictable costs, and analyst-friendly workflows — without the compromises that hold legacy platforms back. Legacy ingest-based SIEMs force security teams to pick between visibility, cost, and analyst efficiency. Graylog changes that model with flat, transparent pricing, license-free data lake storage, and flexible deployment options.

Keeper Webinar - From Passwords to Privileged Access: How KeeperPAM Secures It All

Watch the recording of our exclusive webinar featuring Craig Lurey, CTO & Co-founder of Keeper Security. Discover how KeeperPAM is revolutionizing privileged access management by seeing a walkthrough of the newest KeeperPAM and Endpoint Privilege Manager features in this live demo showcasing its functionality.

The Surprising Benefits of AuditFusion360 for Your Business

Every year, businesses worldwide spend millions of dollars and countless hours on compliance audits — PCI DSS, GDPR, HIPAA, SOC 2, ISO 27001, DORA, SOX, CCPA… the list keeps growing. But here’s the problem: most organizations run these audits separately. That means: Multiple auditors Repeated testing Overlapping documentation Skyrocketing costs In fact, studies show that companies waste up to 40% of their compliance budgets on duplicated audit work. That’s not just expensive — it’s inefficient.

Is SailPoint's NERM the Right Tool for Managing your Non-Employee Identities?

In this video, Dave Cox, VP of Identity Services and Ryan Cluff, Director, IGA Practice at Xalient, dive into how organizations are using SailPoint's Non-Employee Resource Management (NERM) module to better manage contractors and vendors. We also explore how managed services in the identity space are evolving, especially with platforms like SailPoint.

AI Is Writing the Code - Can Security Keep Up? | How to Secure Agentic IDEs from Dev to CI/CD | Mend

AI coding agents are exploding in use—but are they quietly shipping exploitable code? In this webinar, we break down real data, real incidents, and a practical blueprint for securing AI-accelerated development.

AI Meets SAST - Reimagining the Future of Static Analysis | Webinar Mend.io

Join host Tony Morbin as he explores how AI is revolutionizing Static Application Security Testing (SAST) in this future-forward episode with Saoirse Hinksmon, Senior Product Marketing Manager at Mend.io, and Amir Shahmir, Senior Sales Engineer at Mend.io. This isn’t your average security webinar — it’s a deep dive into the convergence of AI and SAST, uncovering how GenAI is making static analysis faster, smarter, and more actionable for developers and AppSec teams alike.

Eliminating Privileged Access Toil with Infrastructure Identity

Modern infrastructure is dynamic, ephemeral, and complex, with new technology (such as agentic AI) constantly being added. However, disjointed and unsecured AI and human identities introduce risk through social engineering, credential theft, and prompt hacking, as well as complexity and toil for engineering teams.

Still Using RBAC in AI? You're Already Behind.

Traditional role-based access control (RBAC) was built for structured systems - not for the messy, unstructured data that powers today’s AI workflows. In this video, we explore real-world healthcare scenarios where RBAC breaks down like mental health notes, lab results, and substance use histories buried in clinical documents. You’ll see how Protecto’s Context-Based Access Control (CBAC) solves this by understanding the user, prompt, and context - and enforcing policies in real time, without breaking AI functionality.