Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ep 15: Beginner's guide to security tools

In this episode, we run through our beginner's guide to security tools, emphasizing the importance of people, processes, and technology. We chat about the NIST framework as a foundational resource for building security programs, highlighting key steps such as identifying and managing risks. We also discuss basic tools like password managers and multifactor authentication as essential for enhancing security, particularly against threats like phishing. Finally, we explore the integration of AI in security and its potential to improve efficiency while maintaining human oversight.

Netwrix Access Analyzer 26 - Major Advances in DSPM

Join us for Day 5 of the Netwrix Innovation Week Podcast Series, part of Cybersecurity Awareness Month. In this episode, Jeff Warren, Grady Summers, and Jordan Violet discuss how Netwrix Access Analyzer 26 is redefining data security posture management. They explore the new architecture built for scalability, flexibility, and speed — and how it helps organizations discover, understand, and secure sensitive data at scale.

Unlocking AI's full value: CIO and CISO perspectives

AI investment is accelerating across industries. Many organizations have either fully or extensively embedded AI in their business processes today. Yet, 40%* of IT teams still express a lack of trust in AI-generated outcomes. They remain in reactive mode, held back by disconnected systems, manual work, and rigid tools. What’s missing?

Teramind Overview Demo

At Teramind, we solve for the Human Element, the side of your business that exposes you to the most risk. Whether incidental or malicious, human error is omnipresent, and the need to understand your workforce activities is essential– as they can significantly impact your bottom line. Teramind is the leading platform for user behavior analytics on every endpoint, enabling you to protect and optimize your business- and solve for nearly every behavior-related use case.

Are we only one prompt away from using AI for evil? #cybersecurity #ai #infosec

Are we only one prompt away from using AI for evil? In this week's episode of The Cybersecurity Defenders Podcast, we explore a concerning reality about AI and cybersecurity. As AI becomes more prevalent within the threat actor community, exploits are being developed faster than humans can patch. The tools that help developers debug code can just as easily be used to weaponize vulnerabilities.

Why auditor choice matters more than you think | Heard in the founder chat

Some things in startup life are just for show—job titles, swag drops, maybe even your first “launch.” Your auditor? Not one of them. In this episode of Heard in the Founder Group Chat, Jadee Hanson, Vanta’s CISO, breaks down why your auditor is more than a checkbox — they’re your external seal of trust.

Under The Light: ExPRT.AI

n this episode of Under the Light, we take a closer look at ExPRT.AI—CrowdStrike’s approach to vulnerability prioritization that cuts through the noise. You’ll see how ExPRT.AI moves beyond static scoring models like CVSS, EPSS, and KEV by asking a better question: Will this vulnerability actually be exploited? We’ll break down: The three signals attackers rely on—and so does ExPRT.AI What makes a vulnerability worth their time A real-world story from Intermex that shows what this looks like in action And how all of it comes to life inside the Falcon platform.