Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Streamlining the Infosec Compliance Journey - An End-to-End Approach

Is your compliance strategy making life easier or just adding more chaos? In this episode of Razorwire, host James Rees (aka Jim) is joined by Martin Davies (Audit Alliance Manager at Drata) and Patrick Sullivan (VP of Strategy and Innovation at A-LIGN) to explore how to cut the compliance overhead, eliminate duplication across multiple frameworks and turn compliance into a competitive advantage that actually speeds up your sales cycle.

Veracode AI Code Secure: Real-Time Supply Chain Security for AI Development

Veracode AI Code Secure for Software Supply Chain is a real-time AI code purifier delivering curated insights on vulnerabilities, malware, and licensing to OEMs. By integrating directly into AI coding workflows, AI Code Secure closes critical security gaps left by outdated or incomplete LLM training data.

Laravel APP_KEY Leaks Lead to RCE: GitGuardian + Synacktiv Reveal Massive Threat

In this video, cybersecurity researcher Guillaume Valadon of GitGuardian breaks down how exposed Laravel APP_KEYs on GitHub can lead to full Remote Code Execution (RCE) in real-world applications. Working in collaboration with Synacktiv, the team uncovered 260,000 exposed keys, validated 600+ vulnerable apps, and revealed that over 35% of leaks also exposed critical credentials like database passwords, cloud storage tokens, and API keys.

Make Your Security Stack Cloud-Flexible with LimaCharlie - Now on Google Cloud Marketplace

Built with security engineers in mind, LimaCharlie's API-first platform delivers on the promise of cloud-like flexibility for your security operations. Learn in the video how to obtain unified, granular visibility across your entire security landscape (multi-cloud, on-prem, endpoints) with day-one value.

Inside the SonicWall SSLVPN Attacks

Inside the SonicWall SSLVPN Attacks In this week’s episode of The 443, Marc Laliberte and Corey Nachreiner break down: The recent SonicWall SSLVPN exploits What we know so far and how attackers are getting in The risks for organizations relying on vulnerable VPN gateways Plus: a WinRAR zero-day and a new ChatGPT vulnerability you should know about.

Sensitive Data Leaks: What You Don't Know Can Hurt You #dataleak #sensitivedata #dataprotection

Sensitive data isn’t always obvious attackers can find and exploit information you never realized was exposed via your APIs. In this clip, Wallarm and Oracle experts explain how insurance policies, business documents, or hidden fields can become valuable targets. Learn why broad data discovery and smarter controls are critical to protect your APIs from unexpected leaks.

Ep 6: Security haven or horror story: from SIEMs to lakes to lakehouses

Between SIEMs, data lakes, and data lakehouses, the buzzwords alone could fill a glossary. In this episode, Adam and David break down the real differences between data lakes and SIEM systems and why effectively managing all that data is crucial for staying visible and secure. They also dive into how AI is shaking up the game and why picking the right tools can mean the difference between being overwhelmed and being in control.

AI in Healthcare: Navigating Data Privacy and Medical Advice

AI in Healthcare: Navigating Data Privacy and Medical Advice In this video, A10 Networks security experts Jamison Utter, Madhav Aggarwal, and Diptanshu Purwar explore the critical security challenges of deploying AI and Large Language Models (LLMs). They focus on protecting sensitive data—especially in areas such as healthcare—and offer key insights on how organizations can effectively secure these powerful technologies.