Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SPARK 25: Deribit Scales Crypto Options Infrastructure with Fireblocks

This is what crypto options infrastructure looks like at scale. Deribit needed to onboard custodians and expand collateral support without months of technical integration for each new relationship. Luuk Strijers, CEO of Deribit, knew they needed a partner with the security, flexibility, and network to scale faster without compromise. That partner was Fireblocks. Full wallet infrastructure across hot, warm, and cold storage Seamless expansion of collateral and coin support Frictionless custodian onboarding through Off Exchange.

What is Vibe Coding? #vibecoding #aisecurity #coding

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

The term "AI Agent" is failing us. #cybersecurity #ai #technews

The term "AI Agent" is failing us. In Prediction, Ev warns that our vocabulary is lagging behind the technology. Calling everything an "AI Agent" is like calling everything "software." It’s too broad to be useful. A browser plugin has a completely different architecture than a microservice or a factory robot. They have different identities, different risks, and different security needs. You can't secure what you can't specifically identify.

Ep 26: You can patch your code, you can't patch burnout

In this episode of Masters of Data, we tackle why cybersecurity professionals burn out, and it's not just long hours. We explore how repetitive tasks, limited growth, and work that feels invisible drain security teams who face constant vigilance with few wins and no finish line. We discuss how high-stakes environments and rigid SLAs prevent real breaks, then share solutions: celebrate small victories, recognize contributions, prioritize physical health, and protect work-life balance. The key? Clear communication, realistic expectations, and making security's invisible impact visible.

The New 2026 China Cybersecurity Law Podcast

A new Chinese cybersecurity law just changed the global threat landscape. In this clip, Tova Dvorin and Adrian Culley break down what went into effect on January 20, 2026—and why it’s unprecedented. Under the updated law, vulnerabilities discovered by Chinese citizens or companies must be reported to the state within 48 hours and cannot be disclosed to vendors until approved. The result? A government-first window to exploit zero-days before they’re patched—at global scale.

Switch from SonicWall and Succeed

If you use SonicWall, you know what type of year 2025 was for your business. Between breaches, price increases, and confusing pivots, your vendor left you to clean up their mess while you paid more for their product and earned less in return. Join Adam Winston, Field CTO at WatchGuard Technologies, to learn why our Unified Security Platform is the right choice for a profitable, worry-free 2026. In this session, we’ll discuss.

Uncovering A Mass VPN Phishing Campaign - The 443 Podcast - Episode 355

This week on the podcast, we cover some first-hand research from the WatchGuard Threat Lab on a phishing campaign targeting users of nearly every major VPN vendor. After that, we discuss two recently resolved vulnerabilities in the Fortinet FortiSIEM application, then end with research from Varonis on a new attack flow against Copilot called RePrompt.

Decoding MITRE ER7: How to Interpret Results That Matter

MITRE ATT&CK Evaluations attract strong attention across the cybersecurity industry by providing detailed, transparent data on how endpoint security solutions behave under real attack conditions. However, the depth of the results often makes them difficult to interpret and compare meaningfully. Join Field CTO Adam Winston as he decodes WatchGuard’s MITRE ER7 results and learn how to weigh key metrics to determine real-world security effectiveness and efficiency.