Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Wallet infrastructure is the new core banking layer

Owning the UI used to mean owning the customer. On blockchain, whoever controls the wallet controls the relationship. In this clip from the Banking Bootcamp, Fireblocks Financial Markets Economist Neil Chopra breaks down why wallet infrastructure is becoming the central layer for digital asset services at banks, and walks through the three use cases scaling in production today: custody and brokerage, stablecoin payments, and tokenization.

How Blockchain Is Reshaping Banking Infrastructure

Blockchain adoption in banking is moving from experimentation to production. In this session, Fireblocks Financial Markets Economist Neil Chopra breaks down where banks, fintechs, and non-bank competitors are already live, what wallet infrastructure means for onchain ownership and control, and why stablecoins are proving the utility case that's pulling the rest of the market forward.

Falcon Exposure Management AI Inventory: Demo Drill Down

AI adoption is accelerating across the enterprise, but governance isn’t keeping pace—leaving security teams without a clear view of what AI is running, how it’s being used, and where it introduces exposure. In this Demo Drill Down, we showcase AI Inventory in Falcon Exposure Management, delivering a centralized view of AI across hosts—from local LLMs and MCP servers to IDE extensions, packages, and applications.

CTEM Explained in 60 Seconds (And Why Your Security Strategy Has Gaps)

(CTEM) Continuous Threat Exposure Management—isn't just another framework. It's a philosophy for finally connecting the parts of your security program that aren't talking to each other. SafeBreach Helm makes it actionable for any organization, no matter where you're starting from.

Ep. 56 - 10,000 Bugs, 12 That Matter: Using AI to Cut Through Exposure Noise with CTEM

Are you still stuck on the vulnerability hamster wheel? In this episode of the Cyber Resilience Brief, host Tova Dvorin is joined by SafeBreach VP of Product Koby Bar and offensive security expert Adrian Culley to unpack a major shift in how enterprises approach proactive security — and to announce the launch of SafeBreach Helm, the AI validation layer built for Continuous Threat Exposure Management (CTEM).

What Real AI Security Incidents Reveal About Today's Risks

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Inside the Hidden VM: How Attackers Stay Undetected

Threat actors are getting better at hiding in plain sight through using virtual environments to evade detection and deliver ransomware. New research from Sophos X-Ops reveals an increase in the abuse of QEMU, an open-source emulator, to conceal malicious activity inside virtual machines. While this technique isn’t new, its use for defense evasion is accelerating, making visibility and detection even more challenging for defenders.

Datadog MCP Server, Experiments, Bits AI Security Analyst, and more | This Month in Datadog

April’s This Month in Datadog spotlights the Datadog MCP Server, which gives AI agents secure, real-time access to Datadog telemetry, and Datadog Experiments, which lets you design, launch, and analyze experiments to see the full impact of product changes on the user journey. Plus, we cover how to: Accelerate Cloud SIEM investigations with Bits AI Security Analyst Remediate vulnerabilities in your codebase with Bits AI Dev Agent for Code Security Explore Datadog with natural language using Bits Assistant.