Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Enforcing GitHub Repository Backups with Rubrik and GitHub Actions

Your CI pipeline enforces tests, security scans, and policy checks before code hits production. But your backups? Still running on a schedule, completely disconnected from your deployments. In this video, I'll walk you through how to use Rubrik's powerful APIs to build what I'm calling "Backup as Code": a GitHub Action that triggers an on-demand Rubrik snapshot of your GitHub repository every time code is merged into the main branch. We'll look at the action code, wire it up to a live repo, and watch the whole thing run end to end.

The AI Compliance Gap No One's Talking About (ISO, NIST, EU AI Act)

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Ep. 52 - The Russian Cyber Triad: GRU, SVR, FSB Explained

In this episode of the Cyber Resilience Brief, we shift from chaotic cybercriminals to the calculated world of Russian nation-state threat actors—breaking down the three agencies that dominate Russia’s cyber operations: the GRU, SVR, and FSB. What many organizations mistakenly treat as a single “Russian threat” is actually a complex ecosystem of competing intelligence agencies—each with distinct goals, tactics, and operational philosophies.

Kimi Found 40+ Security Issues in Our Code. Open Source AI Is Here | Michelle Chen

In this episode of This Week in NET, host João Tomé is joined by Michelle Chen from Cloudflare’s AI product team to discuss the rise of open models, the launch of Kimi 2.5 on Workers AI, and why enterprises are rethinking the cost of proprietary AI.

How does Syteca's #ITDR change the way we handle hashtag#incidentresponse? | Syteca PAM

It shifts your team’s response strategy from reactive to proactive. Traditional tools might tell you a credential was used, but Syteca’s ITDR tells you how it was used. Get real-time insights and visibility into privileged sessions, or review session recordings afterward to gain context. With Sensitive Data Masking to protect personal information during an investigation, Immutable Logs, and searchable history, your team can reconstruct a full incident timeline in minutes. provides the forensic-grade evidence needed to prove regulatory while simultaneously stopping attacks in their tracks.

Syteca's approach to stopping a #breach in progress | #pam #itdr #cybersecurity

Prevention is great, but it’s just the front door. Syteca is built for the reality that someone will eventually get inside. Our approach is to move from passive logging to active 'Auto-Containment'. Because our is reinforced with native , the platform doesn't just send an alert when it sees lateral movement or a risky command — it can automatically terminate that session or block the user instantly. We make containment a real-time technical action rather than just a post-incident manual process.