Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

All About Cloudflare's Developer Week 2025 (AI, Vibe Coding, Agents, and More)

This episode is all about our second innovation week of the year: Developer Week. Host João Tomé is joined in person at Cloudflare’s London office by Ricky Robinett, VP of Developer Relations, and Craig Dennis, Developer Educator. There’s a lot to go through — new tools and announcements launched during this April week. The vibe in the developer world, with AI, agents, and code-first energy, is contagious. More people, even non-developers, are now empowered to build their own tools and applications.

Why That Email Smells Fishy (Phishing Explained Fast)

Ever get an email that seemed… fishy? That ‘Urgent’ Email? Yeah, It’s a Trap. In just 30 seconds, we break down what phishing is, how it works, and how to spot it before it’s too late. Don’t take the bait—stay sharp online. Netwrix helps organizations spot threats like phishing "BEFORE" damage is done.

Enhanced Email Incident Alerting Controls from GitGuardian

GitGuardian is helping reams respond to and remediate incidents more efficiently than ever, thanks to our new Enhanced email incident alerting controls. While you can configure GitGuardian alerts to integrate with servies like Slack, Teams, PagerDuty, and any other system that can work with JSON and webhooks, Email notifications are still the default way we send alerts.

Introducing GitGuardian Custom Tags, Making Filtering and Sorting Incidents and Honeytokens Easier

GitGuardian has introduced custom tags, empowering teams to manage and prioritize secrets incidents and Honeytokens better than ever. GitGuardian has always automatically applied certain predefined tags to help teams identify incidents where, for example, a secret was found in a Default branch, is in a sensitive file, or discovered from a historical scan, just to name a few options.

Illuminate and Defend: Uncovering the Shadows of Your Network

In a vast network filled with legacy systems, unmanaged devices, and hidden threats, visibility is the key to protection. This video explores the importance of understanding and securing every corner of your network—whether it's IT, IoT, OT, or IoMT. With the Forescout 4D Platform, you can illuminate the unseen and gain control over even the most elusive assets to mitigate risks and defend against emerging threats.