Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Privacy in the AI Age: What's Really Changing in 2026 (with Cloudflare's CPO)

In this episode of This Week in NET, host João Tomé is joined by Emily Hancock, Cloudflare’s Chief Privacy Officer and Data Protection Officer, for a wide-ranging conversation about privacy in 2026 and how the role has evolved in the age of AI.

Jupyter Notebook for Protegrity AI Developer Edition

Want to test Protegrity’s data protection features without any local installation? In this tutorial, Dan Johnson shows you how to make your first protect and unprotect API calls directly in your browser using our interactive Jupyter Notebook (Binder). This is the fastest way to see Protegrity’s Python SDK in action—authenticating, applying protection policies, and maintaining data utility in real-time.

LLM Application for Protegrity AI Developer Edition

Securing LLM Workflows with Protegrity AI Developer Edition Learn how to protect sensitive data and prevent malicious prompt injections in your AI applications. In this technical walkthrough, Dan Johnson, Software Engineer at Protegrity, demonstrates a dual-gate security architecture designed to safeguard Large Language Models. Discover how to implement a security gateway that sits between your users and your LLM. This demonstration covers the integration of semantic guardrails and classification APIs to ensure data privacy and system integrity.

The Importance of Realism in Cybersecurity

Hope is not a security control. Security professionals aren't pessimists - we're realists preparing for when systems fail and humans make errors. We model worst-case scenarios and likely threats because probability beats hope every time. Cybersecurity requires realistic risk management and incident response planning, not blind optimism. That's the security mindset. Realism understands controls decay and breaches happen. Preparation stops incidents, not positivity.

Manual API Security in 2026? Good Luck #apisecurity #automation #devsecops #aiautomation #api

You're still doing API security manually in 2026? 2016: 100 APIs → Could handle with smart people doing manual pen testing 2020: 1,000 APIs → Difficult but possible 2025: 10,000+ APIs → Physically impossible Long ago we did API security manually. There weren't many APIs. We had smart people. We'd do some pen testing and move on. That worked in 2016. But let's be honest—this problem is getting EXPONENTIALLY bigger. Every organization will realize: we can't do this manually anymore.

Cybersecurity "Armageddon": Are You Ready?

When it comes to cybersecurity, there’s no such thing as being too prepared. In this clip, Ryan Swimm, Senior Manager, GRC Program from Bitsight explains why "softball" security drills just don't cut it. To truly protect your organization, you need to practice for the worst-case scenario—your own "Armageddon" drill. Inside the Drill: Don't wait for a real crisis to find the gaps in your strategy. Practice for doomsday today!

What's the Difference Between IAM and IGA?

Identity and Access Management (IAM) and Identity Governance and Administration (IGA) are typically mentioned together, but they serve different purposes in identity security. In this short video, learn the key differences between IAM and IGA, why organizations need both and how KeeperPAM extends identity security into privileged environments.