Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Deep Dive | Optimize Your Workflow: New Admin Navigation 12.19.2025

Join us for a detailed review of the Admin Portal navigation update. We will outline the implemented changes, the design rationale, and the feature roadmap. Participate in a live Q&A to submit your feedback and get your implementation inquiries addressed by our team.

Agentic AI and Shadow APIs: Why SecOps Needs Specialization Now

Agentic AI and Shadow APIs: Why SecOps Needs Specialization Now APIs are rapidly becoming the core “language” of AI, and when agentic AI can generate its own APIs, the security stakes rise significantly. In this clip from the A10 Networks discussion, “APIs are the Language of AI – Protecting Them is Critical,” A10 security experts Jamison Utter and Carlo Alpuerto unpack why specialized skills and tools are now essential for modern security operations teams.

CVE-2025-10573: Stored XSS in Ivanti EPM

A critical stored XSS vulnerability (CVE-2025-10573) in Ivanti Endpoint Manager lets attackers poison the admin dashboard with malicious scripts, leading to session hijacking and device compromise. AppTrana blocks these malicious scan submissions at the edge, preventing stored XSS payloads from ever reaching the EPM dashboard, even before patching.

Create Highly Specific File Classifiers with Nightfall's Prompt-Based AI. No Regex Required

Many sensitive documents don’t fit cleanly into standard categories, and traditional approaches like regex or broad classifiers often create noise and false positives. In this video, we walk through how to use Nightfall’s prompt-based file classifiers to detect business-critical documents based on intent, not brittle patterns or custom model tuning.

Risk Acceptance vs Risk Exposure: Making Smarter Security Investments

Before investing in new security tools, it’s critical to understand what your current stack is actually delivering. Barmak Meftah spoke about the importance of baselining existing investments to truly grasp risk acceptance versus real risk exposure. Without that foundation, new acquisitions lack context and are often driven by trends rather than necessity. Smarter decisions come from understanding:︎ What is already deployed︎ How it is configured︎ Where exposure persists.

BlackGirlsHack: Building a community and impactful legacy with Rebekah Skeete [277]

On this episode of The Cybersecurity Defenders Podcast we speak with Rebekah Skeete, Executive Director and CEO of BlackGirlsHack Foundation. Rebekah dives into how BGH is helping to increase diversity in cybersecurity by bridging the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity.

SecurityScorecard CISO Steve Cobb as Cyber Santa's 2025 Naughty and List 2025

AI dominated headlines this year and threat actor groups made bold moves in 2025. From threat actors like Imperial Kitten and scammers using tools like Sora AI to mimc real human voices to Congressional action on the PILLAR act and a $50 billion rural healthcare investment from the U.S. government, there are a lot of moments this year that make up Cyber Santa's Naughty and Nice List for 2025.

Building a Real-Time Multiplayer Chess Game Inside ChatGPT (Agents SDK)

In this clip from This Week in NET, Systems Engineer Steve James gives a hands-on demo of a real-time multiplayer chess game running inside ChatGPT, built with the Agents SDK and Cloudflare Workers. Beyond the demo, we talk about what developers can build today with AI agents — and why, given the pace of innovation, it’s genuinely hard to predict what applications and experiences will emerge in 2026.