Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The One Thing Everyone Gets Wrong About Support #mentalhealth #wellbeing

Different viewpoints and psychological safety improve both problem solving and emotional support in security teams. The clip highlights how rushing to fix other people’s struggles can backfire, and shows why listening without assuming you know the solution is often the most effective response.

How to Set Up Google Drive Integration in monday.com | Connect Google Drive with monday.com

This tutorial demonstrates how to set up the Google Drive Integration for monday.com, enabling seamless access to your Google Drive files directly within monday.com. With this app, you can view, search, and manage your Drive files without leaving your monday.com workspace. Experience smooth 2-way synchronization between Google Drive and monday.com for better collaboration and file management. With the monday.com Google Drive Integration, you can.

Security Visionaries | Agentic AI Threats: Hype or Reality

Are agentic AI threats just hype or reality? Security Visionaries host Max Havey digs into the world of agentic AI-enabled threats and cyber espionage with guests Neil Thacker, Global Privacy and Data Protection Officer at Netskope, and Ray Canzanese, Head of Netskope Threat Labs. IN THIS EPISODE.

AppTrana AppSec Platform | AI-powered All-in-One Web and API Security Platform

About Indusface: Indusface is a leading application security SaaS company, securing over 6,500 customers across 95 countries with its award-winning platform. Backed by leading institutional investors, Indusface is a category leader in cloud WAAP, with repeated recognition from top analysts and industry platforms including Gartner, Forrester, GigaOm, and G2. The industry's only AI-powered, all-in-one AppSec platform helps businesses discover, detect, remediate, and protect web applications and APIs at internet scale, backed by a 100% uptime guarantee.

EP 21 - When attackers log in: Pausing for perspective in the age of instant answers

In this episode of Security Matters, host David Puner welcomes back David Higgins, senior director in CyberArk’s Field Technology Office, for a timely conversation about the evolving cyber threat landscape. Higgins explains why today’s attackers aren’t breaking in—they’re logging in—using stolen credentials, AI-powered social engineering, and deepfakes to bypass traditional defenses and exploit trust.

Are LLMs becoming messengers for attackers? #ai #cybersecurity

AI assistants with broad enterprise access are creating a new attack vector. Chris Luft and Matt Bromiley discuss the Gemini Jack vulnerability, where attackers used prompt injection to turn Google's AI assistant into an unwitting accomplice in data exfiltration. The attack embedded hidden instructions in documents or emails. When employees asked Gemini normal questions like "show me our budgets," the AI retrieved the poisoned document and executed the attacker's commands without anyone clicking anything.

If You Can't Block It, You Don't Secure It. #mitigation #cyberdefense #apisecurity #blocking

Detection is information; Blocking is mitigation. For Business Logic Abuse, simple detection alerts are not enough. Your tools must be able to actively block those manipulative, stateful attacks in real-time. Furthermore: Stop "one-and-done" security testing! You must continuously tune your testing by adopting an adversary's perspective. Tune your defense as constantly as attackers tune their exploits.

Misconfigurations Are Still Owning Security Teams

Garrett Hamilton sat down with Todd Graham, Managing Partner at Microsoft’s venture fund, M12, to talk about why M12 invested in Reach and why our mission was a no-brainer for him. Nation-state attacks make the headlines—but most people are getting owned by misconfigured servers, networks, and controls hiding in plain sight. Turns out the problem isn’t what teams don’t own. It’s what they do own that isn’t, in most cases, even turned on.

Why "We Thought It Was On" Keeps Leading to Breaches

At UC Irvine’s Digital Leadership Agenda 2026, moderated by Nicole Perlroth, Garrett Hamilton illustrates what those blind spots can look like: “We believed it was deployed.”“It was turned on.”“It should have stopped this.” Except one exception, one policy gap, one control not applied at scale — and assumptions replace reality. The real problem isn’t visibility. It’s continuously validating intent against execution.

Cybersecurity Predictions 2026: What Security Leaders Learned in 2025

In this special compilation episode of The Connectivity Cloud Podcast with Cloudflare, Lia Kazandzhieva, Marketing Campaign Manager at Cloudflare revisits the most impactful conversations from 2025 with leading CISOs and security experts to distill the lessons that will define 2026 and beyond. What You'll Learn.