Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Should Sensitive Information Be Stored?

Your sensitive information — passwords, banking details, personal documents — needs proper protection. But are you storing it securely? In this video, we’ll break down the risks of poor storage, the best ways to protect both digital and physical data and how Keeper can help keep your information safe.

Breaking the Intelligence-Defense Divide with Scott Scher

Cyber threat intelligence is often misunderstood, seen as a niche reporting function instead of the connective tissue that links defenders, leaders, and strategy. In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Scott Scher, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his off‑grid years shaped his view on resilience, why CTI should be seen as “counter‑threat intelligence,” and how intelligence defenders, and policy teams can work as one to turn raw data into actionable security decisions.

The "So What?" Problem in Threat Intelligence

Defense teams and many others across the organization don’t always understand what intelligence is or how to use it. Scott Scher explains why that second part, how to use it, is what CTI teams often miss. Scott shares why intelligence must go beyond reports and clearly communicate what matters and what to do next. Key Points: Most teams don’t know how to apply raw intelligence CTI must embed the “so what” and “what now” Reports alone are not enough Actionability is what makes intel valuable.

When AI Agents Go Awry

When your AI agents go awry, rewind those changes easily with Agent Rewind from Rubrik. As AI agents gain autonomy and optimize for outcomes, unintended errors can lead to business downtime. Agent Rewind will enable organizations to undo mistakes made by agentic AI by providing visibility into agents' actions and enabling enterprises to rewind those changes to applications and data. We’ve integrated Predibase's advanced AI infrastructure with Rubrik's recovery capabilities to enable enterprises to embrace agentic AI confidently.

Why Authorization Is Still the Weakest Link in API Security? #apisecurity #authorization #zerotrust

Even as authentication improves, broken authorization remains one of the most exploited vulnerabilities in APIs. In this clip, Wallarm and Oracle experts discuss real-world authorization flaws—including how missing or weak access checks can let attackers access sensitive data and functions. Learn why robust, field-level authorization is essential to protecting your APIs.

The Unified IT Imperative: Simplifying Complexity and Future-Proofing Your Organization

In this episode of the Make Work Happen podcast, we explore the strategic imperative of unified IT and how it helps leaders shape the future of their organizations. We draw on key findings from JumpCloud’s latest IT trends report to understand why IT fragmentation is a critical challenge for leaders worldwide. Joining us is JumpCloud customer Ricky Jordan, who provides a real-world case study on how a unified platform can simplify complex IT environments, address security risks, and drive strategic conversations.

The MemcycoFM Show: Episode 12 - How The 5 Biggest Bank ATO Attacks Could've Been Stopped

Bank account takeover fraud is a growing global threat, costing financial institutions and customers billions each year. Attackers are refining their tactics, blending phishing, credential stuffing, and mobile malware to bypass traditional defenses. For banks, the stakes are high: a single breach can erode customer trust and regulatory standing overnight. We break down five of the most impactful account takeover attacks in recent years, examining what happened, how it happened, and how Memcyco’s real-time, browser-level, and mobile-layer protections could have mitigated the damage.