Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyber Resilience, AI Threats & Business Impact: Findings from 2025 LevelBlue Futures Report

Cyberattacks are evolving fast; powered by AI, deepfakes, ransomware, phishing, and growing software supply chain risk. So how prepared is your organization? In this webcast, we breakdown key findings from the 2025 LevelBlue Futures Report (in partnership with FT Longitude). The report is based on a global survey of 1,500 C-suite and senior executives across 16 countries and seven industries, including healthcare, financial services, energy, and manufacturing.

The New CISO Podcast Ep. 139 - Alex Rice | Safety Third: Why Security Shouldn't Be Your Top Priority

In this episode of The New CISO, host Steve Moore speaks with Alex Rice, Founder, CTO, and CISO at HackerOne, about challenging one of cybersecurity's most deeply held beliefs—that security should be the top priority. Drawing from his journey building security programs at Facebook and founding HackerOne, Alex introduces the "safety third" philosophy and explains why accepting that security is never first can actually make you more effective as a leader.

The Media Mogul's Take: Cyber & Storytelling in the Age of AI

Despite the connection with Robert De Niro, we won’t be spoiling Zero Day for you yet. But there is a large intersection between the future of media, cybersecurity, and AI, and we’re excited to jump into it! Join Aleksandr Yampolskiy (CEO & Co-Founder, SecurityScorecard) and Sandy Climan (President, Entertainment Media Ventures, Inc.) in this webinar, where they chat about: SecurityScorecard monitors and scores over 12 million companies worldwide.

How to Stop Sensitive Documents From Leaking in Slack, Gmail, and ChatGPT (Demo)

Your security tools can detect credit card numbers, but they are blind to the files that actually matter. In this demo, we show how sensitive documents like: Internal source code Financial forecasts Performance reviews Customer lists are automatically detected and blocked in Slack, Google Drive, SharePoint, Gmail, and even ChatGPT using Nightfall’s new AI-powered file classifiers. No regex. No keywords. No training data.

Why the Target Breach Wasn't a Detection Failure - It Was Prioritization | Garrett Hamilton at UCI

Nicole Perlroth asks Garrett how Reach's involvement would have impacted the breach with Target. Attackers came in through a third-party HVAC vendor. Credentials were compromised. Alerts fired. But nothing rose to the level of urgency it deserved. As Garrett Hamilton explains at UCI, this is where security breaks down—not detection, but prioritization. Most teams keep investing in reacting faster inside the SOC. The harder (and more effective) shift is upstream: reducing the exhaust before it ever hits the console.

Why Traditional Threat Detection Is Failing Security Teams

As attack surfaces continue to expand, many security teams are finding that traditional detection methods can’t keep up. In this clip, the discussion centers on why legacy security tools struggle in modern environments — from the growing complexity of networks to the sheer volume of alerts teams are expected to investigate. When alerts are handled manually and without sufficient context, it becomes difficult to understand which threats are most critical and how quickly to respond.