Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Under The Light: Operationalizing CTEM with Falcon Exposure Management

CTEM promises a better way to manage exposure but only if it can be operationalized. In this lightboard session, we break down the CTEM framework and show how Falcon Exposure Management turns it into a continuous, actionable program—helping teams reduce noise, validate real risk, and drive measurable exposure reduction.

How to Import Your Passwords Into Keeper

Keeper Web and Desktop App version 17.5 integrates an improved import experience that guides you through uploading your passwords from web browsers, other password managers or a text file. You can then review, edit and customize how you would like the new records to appear in your vault within an easy to use field mapping interface.

Ep. 42 - Iran's Cyber Shadow War: IRGC, MOIS, and the Battle for Control

*Episode 2 of 6 – Iran’s Cyber Program Explained* In *Iran’s Cyber Shadow War: IRGC, MOIS, and the Battle for Control*, we continue our deep-dive into Iran’s cyber operations by exposing the internal power struggle driving its most dangerous digital attacks.

GLM 4.7 vs. The Giants: Is This the New King of AI Coding?

Can a lesser-known model compete with the likes of OpenAI, Google, and Anthropic? In this video, we put Z.ai’s GLM 4.7 to the ultimate test. We task it with building a production-ready, secure Node.js note-taking application from a single prompt to see if its code quality and security stand up to the big name foundational models.

Keeping the Factory Floor Up and Running

The failure of a server that manages crucial elements of an automated factory floor operation, halting production, is the greatest fear of any OT leader. As factories become more automated, finding a solution becomes crucial. Watch this video to learn how to build fault-tolerant factory floors with Acronis Cyber Protection for OT. Speaker: Michael Bova | Enterprise Account Executive at Acronis.

Dawn Cappelli on the global threat environment

The gloves are off: the threat environment has escalated! Global conflicts have led to a surge in cyberattacks targeting critical infrastructure. Tune in to the latest episode of the Data Security Decoded podcast for a fantastic conversation with Dawn Cappelli that covers rising global tensions, the rapidly evolving threat landscape, and how to secure OT environments from bad actors. Subscribe to our channel and never miss an episode!