Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Veracode: Automating Application Risk Management with Veracode CEO Brian Roche

Hear from Veracode's CEO, Brian Roche, on how organizations worldwide face mounting security risks from AI and applications but struggle to identify where those risks reside. Veracode's Application Risk Management Platform solves this challenge by helping enterprises focus on their most critical applications—the ones that would irreparably impact business if compromised. Through automated AI-powered vulnerability detection and remediation, Veracode enables organizations to dramatically improve their compliance from 30% to 90% with just a few clicks.

Learn How Veracode Stops Attackers from Exploiting Vulnerabilities from Founder Chris Wysopal.

Hear from Veracode's Founder and Chief Evangelist, Chris Wysopal, on how attackers compromise organizations by scanning applications for vulnerabilities in code, APIs, mobile integrations, and cloud environments. Vulnerabilities enter systems through feature updates, open-source components, and third-party code—creating constant exposure.

Learn How Veracode Helps Developers Deliver Fast Without Compromising Security with SVP Sarah Law

Hear from Veracode's SVP of Business Operations, Sarah Law, on how developers face immense pressure to deliver software quickly while security and compliance teams struggle to keep pace with constant changes. The Veracode platform addresses this challenge by discovering and organizing all technology assets across systems, then assessing the risk associated with each one. What sets Veracode apart is its built-in governance and unified, configurable policy framework that adapts to each customer's unique security posture and regulatory requirements.

The Most Dangerous Blind Spot in SaaS Architecture #saas #saassecurity #cloudsecurity #apisecurity

When data flows between two critical SaaS tools (like Salesforce and a CRM chatbot), you have zero visibility into that traffic. This leaves a gaping hole for attackers to exploit Business Logic Abuse. Since you can't see the traffic, you cannot monitor the attack. The Solution? Rigorous Vendor Management. Control Your Own Keys! The responsibility to protect your sensitive data is always yours, even in the cloud.

Product Spotlight: Building an AI-driven SOC at scale, with Reddit

Your security team is one-of-a-kind. Your AI SOC should be too. Join Thomas Kinsella, Co-founder and Chief Customer Officer at Tines, and Nick Fohs, Senior Manager, Enterprise Systems & Security, at Reddit, for a conversation around building and scaling an AI SOC - one that’s adaptable to your evolving needs. They’ll share how you can maximize your investments and the efficiency of your SOC by combining predictable, rule-based workflows with fully autonomous agents.

How Exabeam Uses Its Own Security Platform to Defend Against Threats

At Exabeam, we don’t just build a security operations platform — we use it to protect ourselves. In this behind-the-scenes look at the Exabeam Security Operations Center (SOC), you’ll see exactly how Exabeam uses Exabeam to secure our corporate systems, customer data, cloud environments, and internal infrastructure.

Fixing Shadow APIs: Why True Remediation is Critical in the Age of AI

Fixing Shadow APIs: Why True Remediation is Critical in the Age of AI Agentic AI is fundamentally changing the security landscape, transforming how we think about API protection. In this insightful discussion, A10 Networks security experts Jamison Utter and Carlo Alpuerto dive deep into the challenges presented by this new wave of automation and API consumers.