Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing The GitGuardian IDE Extension for VS Code, Cursor, Antigravity, And Windsurf

Ship fewer secrets with your code. In this video we walk you through installing and using the GitGuardian IDE extension in Visual Studio Code, Cursor, Antigravity, Windsurf, and any VS Code compatible editor. You will see how the extension uses ggshield, the GitGuardian command line tool, to scan for 500+ types of secrets and catch plaintext credentials as soon as you save a file, long before they can be committed.

Prompted to Fail: The Security Risks Lurking in DeepSeek-Generated Code

CrowdStrike research into AI coding assistants reveals a new, subtle vulnerability surface: When DeepSeek-R1 receives prompts the Chinese Communist Party (CCP) likely considers politically sensitive, the likelihood of it producing code with severe security flaws increases by up to 50%. Stefan Stein, manager of the CrowdStrike Counter Adversary Operations Data Science team, joined Adam and Cristian for a live recording at Fal.Con 2025 to discuss how this project got started, the methodology behind the team’s research, and the significance of their findings.

Are we on the path to AI defenders vs. AI attackers?

Swarms of AI bots are now being used to continuously test security perimeters. In this episode, Michael Baker, VP and Global CISO at DXC Technology, discusses the shift to AI-driven security operations. He recently met with startups working on agentic pentesting to find vulnerabilities before bad guys do. The advantage? You control these bots and get immediate feedback. The threat? Adversaries are building the exact same capabilities right now.

Ask SME Anything: What is Universal ZTNA?

Most traditional access tools (VPNs, firewalls, and NACs) were never built for today’s hybrid world. If your legacy access tool is slowing you down, you need a different approach. In this episode of Ask SME Anything, Netskope expert Francisca Segovia explains how universal ZTNA redefines secure access for every user and device, anywhere. Life’s too short for slow connections. Reimagine your access architecture now with universal ZTNA from Netskope.

Stateless vs. Stateful: The Difference in Cyber Attacks #StatefulAttack #businesslogic #apisecurity

The Hacker is Having a Conversation with Your API. There are two kinds of attacks you MUST understand: Stateless (Brute Force): One-and-done, instant gratification. Think SQL Injection. Stateful (Sophisticated): A persistent conversation over time. This is the signature of Business Logic Abuse. Why does this matter? Stateful attacks are executed by sophisticated threat actors who have done their due diligence on your architecture. You must evolve your defenses to monitor the entire session, not just single requests!

Elevating and Evolving the Role of the Channel

Nucleus Manager of Channel Enablement and Training, Tony Ramirez, talks about his recent recognition in CRN's 100 people to know for the channel. During this conversation, he also discusses the evolving role of channel leaders in cybersecurity, the importance of continuous threat exposure management (CTEM) as a process rather than a tool, and the need for contextual understanding in vulnerability management. Tony emphasizes the significance of engaging non-security stakeholders and the opportunities for the channel to educate clients on security posture and vulnerability management.

Securing and Accelerating Public Sector Networks with Cloudflare Magic WAN

Cloudflare's Magic WAN is a secure, global network service that connects enterprise locations and users with faster, more reliable performance. It replaces traditional VPNs and MPLS with a cost-effective solution, leveraging Cloudflare's extensive edge network to improve both speed and security. In this webinar, you will learn how to: Seamlessly integrate Magic WAN with Cloudflare’s security features Enhance protection against modern network threats Optimize network traffic for better performance Reduce costs compared to traditional VPNs and MPLS solutions.