Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Logs & Lattes: Episode 2 - From Noise to Action: Smarter Security Ops That Reduce Risk

Security teams are overwhelmed by alerts, but which ones really matter? In this episode of Logs & Lattes, host Palmer Wallace talks with Rich Murphy, Senior Product Manager at Graylog, about how smarter security operations help teams cut through the noise and focus on what truly reduces risk. From alert fatigue to risk-first response, they unpack practical ways to prioritize real threats, automate with context, and make incident response faster and more effective. Learn how modern SOCs are evolving beyond alert overload to focus on meaningful, risk-based action.

1Password Presents: Securing the Win

Buckle up. We’re taking you inside a world where speed meets security We teamed up with Motorsport to bring the Oracle Red Bull Racing story to life in Securing the Win – the first-of-its-kind docuseries exploring how performance, precision, and security come together behind one of the world’s most advanced teams. Hosted by former F1 technician Calum Nicholas, the series takes you inside the high-pressure world of racing. Each episode uncovers lessons every security leader can relate to: trust under pressure, resilience through change, and speed without compromise.

Using Honeyfiles to detect adversaries and infostealers with Zane Gittins

Defender Fridays - Using Honeyfiles to Detect Adversaries with Zane Gittins Join us for this week's Defender Fridays as we explore using honeyfiles to detect adversaries and infostealers with Zane Gittins, IT Security Manager at Meissner Filtration Products. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Paul Hartmann AG optimizes identity management with One Identity

For the medical industry, clean directories, end-to-end security and streamlined workloads are key to ensuring quick, professional relationships with clients. And for a company that deals with medical products in areas such as wound care, hospitals, surgical centers and home care, data protection needs to cover both patients and their healthcare providers. For this, Germany-based Paul Hartmann AG turned to One Identity Manager for its smooth integration with every SAP system in their environment and optimized account creation with secure, efficient identity lifecycle management.

Automation Anywhere + Protecto: How Leaders Secure GenAI Data

GenAI data security is now a critical concern for every enterprise. In this insightful episode of AI On The Edge, Dinesh Chandrasekhar, Founder and Chief Analyst at Stratola, sits down with Amar Kanagaraj (CEO, Protecto.ai) and Steve Shah (SVP Products, Automation Anywhere) to explore the future of data privacy, agentic automation, and securing LLMs in enterprise settings. Learn how two of the industry's top innovators are setting AI guardrails, preventing sensitive data leaks, and embedding privacy-by-design into large-scale automation.

Securing AI Applications in the Cloud: Shadow AI, RAG & Real Risks | Mend.io

What does it take to secure AI-based applications in the cloud? In this episode, host Ashish Rajan sits down with Bar-el Tayouri, Head of Mend AI at Mend.io, to dive deep into the evolving world of AI security. From uncovering the hidden dangers of shadow AI to understanding the layers of an AI Bill of Materials (AIBOM), Bar-el breaks down the complexities of securing AI-driven systems. Learn about the risks of malicious models, the importance of red teaming, and how to balance innovation with security in a dynamic AI landscape. What is an AIBOM and why it matters The stages of AI adoption.

Why Security Can Be Stricter: A Zero Trust Approach to AppSec with AI | Mend.io

Is AI making application security easier or harder? We spoke to Amit Chita, Field CTO at Mend.io, the rise of AI agents in the Software Development Lifecycle (SDLC) presents a unique opportunity for security teams to be stricter than ever before. As developers increasingly use AI agents and integrate LLMs into applications, the attack surface is evolving in ways traditional security can't handle. The only way forward is a Zero Trust approach to your own AI models. Join Ashish Rajan and Amit Chita as they discuss the new threats introduced by AI and how to build a resilient security program for this new era.