Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How the Cloud Reshapes Your Attack Surface

Cloud environments have reshaped the way applications are built and the way attackers break in. Traditional security strategies centered on malware and compromised endpoints are no longer enough. In today’s cloud, adversaries increasingly rely on valid credentials, identity abuse, and native cloud capabilities to move laterally and establish persistence without ever deploying malware.

Veracode CEO Brian Roche: How to Scale a Tech Company in the AI Era | Vlad Kachur Show Exclusive

How do you scale a world-class tech company while staying ahead in application security and AI-driven innovation? In this powerful exclusive interview on The Vlad Kachur Show, Brian Roche, CEO of Veracode, breaks down exactly how he transformed Veracode into one of the globe's leading application security platforms trusted by enterprises worldwide.

What are AI skill-gaps new defenders can leverage? #cybersecurity #ai #podcast

AI skill gaps are a real conversation right now, and Chris Cochran, Field CISO and VP of AI Security at SANS Institute, breaks it down into three practical buckets for defenders who want to stay ahead. Start by figuring out what you can offload to AI: summarization, enrichment, repetitive tasks. Save the deterministic decisions for humans. Then learn how to secure AI itself: Finally, understand governance. Not just the technical side, but what your company is actually trying to do with AI. Security practitioners who can enable the business, not just protect it, become irreplaceable.

Episode 9 - Federal Cyber Defense: Legacy Debt, Cloud Shifts, and Network Truth

Richard Bejtlich sits down with Jean Schaffer, Corelight’s Federal CTO, to discuss the unique hurdles facing government agencies in an era of escalating state-sponsored threats. Jean highlights the persistent challenge of legacy IT infrastructure and the "technical debt" that complicates modernization efforts across the Department of Defense, the intelligence community, and the civilian sector. The conversation explores the strategic shift toward cloud adoption as a means to decommission vulnerable on-premise hardware and the evolving "whole of nation" defense strategy that requires deeper public-private partnerships.

Leadership Expectations From Cybersecurity Teams Have Fundamentally Changed

In Episode of Guardians of the Enterprise, Ashish Tandon, Founder & CEO, Indusface, spoke with Madhur Joshi, CISO at HDB Financial Services (part of the HDFC Group), about how leadership expectations from cybersecurity are evolving. They discussed how boards today are looking beyond traditional security metrics, with a sharper focus on third-party risk, data governance, and organizational resilience.

Mapping and Managing AI Supply Chain Risk (Featuring Panorays)

-Recent breaches show AI risk is already present in many environments, often entering through suppliers, data flows, and integrations. But awareness alone is not enough. CISOs and security leaders must actively manage the expanded attack surface AI creates. In this session, experts from CyCognito and Panorays help you understand how to identify AI relationships, assess the risks they pose, and remediate vulnerabilities before they lead to an incident. You’ll learn.

Security leaders are rethinking how visibility and control shape trust #identitysecurity #netwrix

Security leaders are rethinking how visibility and control shape trust and compliance. Hear the conversation in the latest episode of Voices of Cyber Asia. Join Netwrix at the Gartner Security & Risk Management Summit in Sydney. Visit our booth to see how identity-first visibility connects data and identity security to strengthen data security, reduce risk, and simplify compliance. Link in bio to listen to the full episode and join the conversation.