Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Inside Identity Security - A Red Team Cybersecurity Documentary by Teleport

What happens when real attackers target your infrastructure —and your team has to defend it in real time? This 24-minute cybersecurity documentary takes you inside a high-stakes Red Team vs Blue Team exercise, where Persistent Security simulates an advanced attack on Teleport’s Identity Security team. As the defenders race to detect, respond, and protect their systems, the film reveals the pressure, strategy, and human dynamics behind modern threat detection.

EP 11 - The calm CISO: Strength under pressure

What does it take to stay calm in the face of constant cyber pressure—and why does that mindset matter more than ever? In this episode of Security Matters, host David Puner speaks with Den Jones, founder and CEO of 909Cyber, about his transition from enterprise chief security officer (CSO) to cybersecurity consultant.

Bret Taylor of Sierra: How to sell to Enterprise Companies as an AI Startup | Frameworks for Growth

In this episode of Frameworks for Growth, Vanta CEO Christina Cacioppo sits down with Bret Taylor, Co-founder and CEO of Sierra, to discuss the evolution of technology, from the early days of cloud at Salesforce, to enterprise-ready AI companies—plus cultural lessons from companies like Google and Facebook, and what it takes to launch successful AI startups today. Bret shares insights from decades at the forefront of tech innovation—including his time as co-CEO of Salesforce and CTO of Facebook—offering advice for founders navigating today’s market and tomorrow’s challenges.

WatchGuard's Q1 2025 Internet Security Report. - The 443 Podcast - Episode 335

This week on the podcast, Corey Nachreiner and guest host Ryan Estes from WatchGuard’s malware analysis team explore WatchGuard’s recently released Q1 Internet Security Report (ISR). As always with the ISR, we highlight the top malware, network attacks, and malicious domains that our products see, but with our guest host, the author of the Endpoint section, we dive much deeper into all the threats arriving at our customers’ endpoints. Listen in for the latest threat landscape trends and some practical tips to stay safe from the most recent threats.

Ransomware Strikes : The Final Conclusion (Part 4)

Moving into the Final Chapter of Our Ransomware Series! You've made it through the critical first hour—great job! Now, the real work begins. In this video, we go into the after effects and solutions to what happens after the initial containment, including the importance of a solid Incident Response Plan, whether to pay the ransom, engaging experts, and the crucial steps to recover and harden your defenses.

Shadow AI Is Everywhere. Cato Puts You Back in Control

Generative AI boosts productivity—but also introduces serious risks: data leakage, compliance violations, and flawed outputs. Most enterprises lack visibility into how GenAI tools are being used across their environment. Cato changes that. In this video, we introduce Cato’s GenAI Security Controls—a native part of the Cato SASE Cloud Platform. No extra consoles. No new licenses. Just immediate visibility and control.