Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CISOs - Transforming third-party risk assessments

CISOs struggle with third-party risk assessments. Automate third-party assessments and eliminate mundane tasks. Use AI and API driven automation to accelerate and simplify first-party, third-party, and nth-party risk assessments. Automate document analysis and receive contextual, reliable information. Run frequent, programmatic risk assessments on all your internal and third-party applications to eradicate the risk of one-time or point-in-time evaluations.

Lightboard Lab: Closing the Valley of Visibility in Network Vulnerability Assessment

Network Vulnerability Assessment is often treated as a point-in-time exercise—but real environments don’t stand still. Between long scan cycles, two things are constantly changing: network devices drift as configurations and versions evolve, and the world around them shifts as new vulnerabilities are disclosed.

Lightboard Lab: How Falcon Data Security Stops Data Theft

Data breaches often happen with valid access. Even authorized users and trusted devices can lead to data loss—from insider threats to credential-based attacks. See how Falcon Data Security detects and stops risky data movement in real time, even when activity looks normal. Subscribe and stay updated!

Lightboard Lab: What Modern Data Security Requires

Modern data security must go beyond data at rest. Sensitive data is constantly moving across endpoints, SaaS, cloud, and AI—creating risk that traditional DLP and DSPM tools can’t see. Learn how Falcon Data Security delivers real-time visibility into data in motion to detect and stop data loss before it becomes a breach. Subscribe and stay updated!

Lightboard series - Secure your AI-powered applications with Cloudflare

Humair from Cloudflare walks through the details of how Cloudflare's AI Security for Apps secures AI-powered applications. Learn how Cloudflare can discover AI/LLM endpoints and detect and mitigate AI-specific threats like PII exposure, unsafe/toxic content, prompt injection and jailbreak. Learn more.

George Kurtz + Dan Ives on AI Agents Bypassing Security Policies

One AI agent didn’t have permission to fix an issue… so it asked another agent with access to do it. Another? It rewrote the security policy to achieve its goal. This isn’t theory. This is happening. George_Kurtz sat down with DivesTech to discuss why AI needs guardrails.

SecurityScorecard Weekly Brief: The Adversary Insights Edition with Steve Cobb

This is SecurityScorecard's Weekly Brief: The Adversary Insights Edition with SecurityScorecard's CISO Steve Cobb. Critical infrastructure security in the U.S. remains an important element of the ongoing conflict between the U.S. and Iran with Iranian-linked threat actors targeting US-based assets. Iranian threat actors have focused their efforts on the fastest methods of attack by searching for what Cobb calls “low hanging fruit” in critical infrastructure environments where many organizations have exposed systems.