Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

API Security Insights: The Architect's Perspective #APIArchitect #ProactiveSecurity #TechInsights

API architects play a critical role in building secure systems by applying proactive controls to prevent vulnerabilities. Their approach focuses on designing APIs with security as a foundation, ensuring stronger protection for every system.

How to Build a Discord Bot in 16 Minutes (Part 2)

This is the second video of our series 'How to Build a Discord Bot'. In this video, we will be learning about what Wordle is and how it works as well as building out the logic for the bot and testing it out. Stay tuned for the next video where we start using a database to store the Wordle results! Each video will be published one week from the previous.

SASE in China: Secure, Reliable Connectivity

China is a vital market for global enterprises but often poses connectivity challenges due to strict regulations, unpredictable network performance, and complex compliance requirements. But what if you could turn these challenges into opportunities? Join Philip Walley as he introduces Cato SASE, the ultimate solution for seamless, secure, and high-performance global connectivity to and from China.

Nucleus Security's Year-End Panel on Risk-Based Vulnerability Management

In this Nucleus webinar, our panel of cybersecurity experts delves into the complexities and best practices for Risk-Based Vulnerability Management (RBVM) in modern organizations. Led by co-founder Scott Kuffer, the discussion covers the evolution of RBVM, the importance of a unified data approach, the role of automated tools, and effective metrics for vulnerability management. Insights from Cecil Pineda, Gregg Martin, and Steve Carter provide a comprehensive look at strategies for mitigating risks and improving security posture through enhanced vulnerability management processes into 2025.