Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Webinar Replay - Navigating AI Governance In Retail: Lessons from Real-World Scenarios

As AI continues to innovate the retail industry in areas such as supply chain management, personalizing customer experience and data insights, businesses must navigate the complex challenges of data privacy, secure and compliant AI deployment and ethical use. During this briefing, Kroll experts highlighted the key steps for building a resilient AI Governance program using real-life use cases from the retail industry that will help not only to understand, implement and monitor responsible AI but clear the way for innovation to generate successful return on investment and build consumer trust.

Account Takeover Nightmare: Why You're Always Fighting Fires! #appsec #cybersecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

The Memcyco FM Show: Episode 10 - Stopping Fake Mobile Apps and Account Takeover (ATO)

Fake apps are the latest evolution of brand impersonation, and they’re proving just as dangerous as phishing sites. Fraudsters clone legitimate mobile apps, publish them on official app stores, and trick users into entering credentials — which are then reused in the real app before anyone notices. Given that over 60% of web traffic is now mobile, this form of phishing-driven credential reuse has become one of the top blind spots in mobile fraud defense. Yet most mobile security tools can’t detect it — because they don’t know where those credentials came from.

Evaluating AI Security: Performance vs. Safety

Evaluating AI Security: Performance vs. Safety In this video, A10 Networks' security leaders Jamison Utter, Madhav Aggarwal, and Diptanshu Purwar discuss the crucial considerations for evaluating AI security within an organization. Madhav Aggarwal emphasizes the following points: AI companies operating in this evolving frontier. It is often difficult to attain both through the same AI model. This segment delves into why achieving both can be a complex task through the same model.