Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

PII Exposed in Your Logs? Fix It Fast With Observability Pipelines

Help keep your logs secure before they leave your environment. In this video, we’ll show you how to use Datadog Observability Pipelines to easily discover, classify, and mange sensitive information—like PCI, PII, or custom patterns—from your logs on-premise to support compliance needs. You’ll learn how to: Whether you’re in DevOps, Security, or Compliance, this workflow helps support your data privacy initiatives without disrupting your existing logging setup.

Intergrating Secure Lifecycle into DevOps for PCI DSS Compliance

SLC refers to the entire process of developing and maintaining software, encompassing various stages like planning, design, development, testing, deployment, and maintenance. The average cost of a data breach in the financial sector is approximately $5.85 million. Incorporating security into DevOps can significantly reduce these costs by preventing breaches early. Around 73% of organizations have adopted DevSecOps practices to embed security into their DevOps pipelines.

Protect your Organization with Netwrix Data Security Posture Management

Would your team know if a hacker was moving through your systems right now? 45% of data breaches involve cloud-based data, often due to poor visibility and weak security posture. Every day, attackers exploit blind spots in data discovery, classification, and monitoring—gaining access to critical information undetected. Netwrix Data Security Posture Management (DSPM) puts an end to that. Ready to take control of your data security posture?

AI and Compliance: Preventing Personally Identifiable Information Leakage

AI and Compliance: Preventing PII Information Leakage In this video, A10 Networks' security leaders, Jamison Utter, Madhav Aggarwal, and Diptanshu Purwar, delve into the growing security risks associated with the adoption of conversational AI bots and Large Language Models (LLMs), particularly in sensitive fields such as healthcare. Diptanshu Purwar highlights several key concerns.

Creating an MCP Server in Tines

MCP servers in Tines allow you to create custom AI tools and connectors using the new MCP server action template. Integrating Tines and MCP streamlines incident response and workflow automation, enhancing efficiency and security operations by enabling seamless communication and data integration between systems. New to Tines? Sign up for our always-free Community Edition and start building right away.

Rubrik Preemptive Recovery: Explained!

In the fight against ransomware, every second counts—if you're manually responding only after an attack, you could already be too late. In this video, we'll explore Rubrik's Preemptive Recovery Engine, a groundbreaking capability designed to proactively detect threats and speed up your recovery response. Unlike traditional, reactive solutions, Rubrik automatically identifies clean snapshots, pinpoints the optimal recovery points, and prepares your critical data ahead of threats—dramatically shrinking your recovery window and minimizing disruption.