Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Philanthropist's Take: Bolstering Cyber Civil Defense

“Doing well by doing good” – there’s something to be said for that. Join Aleksandr Yampolskiy (CEO & Co-Founder, SecurityScorecard) and Craig Newmark (Founder, craigslist, Craig Newmark Philanthropies) for this discussion on: SecurityScorecard monitors and scores over 12 million companies worldwide. Find your company's security score for free at SecurityScorecard.com Follow our CEO Dr. Aleksandr Yampolskiy.

Security Embedded In Your Data #Protegrity #datasecurity #cybersecurity #datacentric

Move beyond outdated security models that focus on protecting data infrastructure rather than the data itself. By embedding protection that travels with the data, you create a deterministic environment where data knows its own purpose and enables innovation at scale. Visit Protegrity.com to learn more.

How to Measure Configuration Drift (And Why Alerts Get Ignored)

Configuration drift isn’t just “change.” It’s unmanaged change. Let's get practical about how teams should actually measure drift: ⇢ What type of change occurred⇢ How often those changes happen⇢ How critical they are in real context⇢ And—most importantly—how teams respond Volume alone isn’t the metric that matters. If changes pile up without response, alerts get ignored—and drift quietly becomes exposure.

The Asymmetric Threat: Why AI API Traffic is Hard to Predict

The Asymmetric Threat: Why AI API Traffic is Hard to Predict As AI becomes more integrated into business operations, the way data moves through APIs is changing. In this clip from the A10 Networks webinar, "APIs are the Language of AI: Protecting Them is Critical," experts Jamison Utter and Carlo Alpuerto break down the concept of data asymmetry in AI.

Elevating Access Reviews to Be a Business Enabler

Is your organization treating access reviews as a checkbox exercise — or a business enabler? In the full video, CyberArk’s Deepak Taneja explains why access reviews are becoming a critical pillar of identity security and zero trust — and how automation is reshaping their value across the business. Watch the full interview to learn why a compliance-only mindset creates risk, how organizations are modernizing access reviews, and what it takes to shift from audit task to strategic advantage.

Why Vulnerability Management Falls Short - And How Exposure Management Fixes It

Vulnerability management identifies weaknesses. Exposure management helps prioritize them based on real-world risk and context. Ed and Garrett unpack why traditional vulnerability programs struggle to drive real risk reduction. The challenge isn’t discovery. It’s prioritization and follow-through. Too often, vulnerabilities are treated as isolated IT tasks—handed off, tracked by SLAs, and stripped of the context that explains why they matter in the first place.