Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SOC 2 Compliance for SaaS Companies

Is your SaaS company struggling to close those big enterprise deals? Chances are, they're asking for SOC 2 compliance – and for good reason! A staggering 82% of enterprises demand SOC 2 compliance from their SaaS vendors to mitigate data breach risks (Cloud Security Alliance, 2023). Without it, you're missing out on massive opportunities!

Common pitfalls when evaluating AI agents for the SOC

When evaluating AI agents for your SOC, it's not just about capabilities—it’s about control, oversight, and integration. In this clip, Philippe Tchakovski breaks down the most common mistakes security teams make when adopting AI: from fragile API integrations to missing guardrails and a lack of audit trails. Don’t deploy blindly—understand the risks before automation goes live.

Security isn't a department.

Security isn’t a department. It’s a shared responsibility. To move from reactive to preventive, every product team needs embedded cyber expertise. Ange Ferrari, SVP and CISO at Metro AG, explains how decentralizing security enables scale and forces organizations to treat security as everyone's job, not just IT's. If you want to "shift left" for real, this episode is your playbook.

What is a Web Browser Based Attack?

Did you know 95% of undetectable malware spreads through your browser? From Cross-Site Scripting (XSS) and CSRF to Clickjacking and drive-by downloads—web browser-based attacks are more common and more dangerous than ever. In this video, we break down how these attacks work, what causes them, and what you can do to stay protected—both as a user and a website owner.

Your Code Might Be Using Risky AI Models

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Turn Visitors into Buyers: How to Reduce Customer Drop-Off & Increase Conversion | Shopify Webinar

Over 70% of customers abandon their carts before checkout, and most stores never figure out why. In this exclusive webinar, we break down why Shopify visitors abandon their carts, where the drop-offs occur, and how to win them back with smart re-engagement strategies and powerful analytics tools. From identifying drop-off points to fixing friction and boosting conversions, we’ve covered it all! What You’ll Learn.

Catch Bugs Faster: Cursor's BugBot for AI Code Review

In this video we dive into Cursor's 1.0 release, focusing on their new BugBot feature. This AI-powered tool integrates with your GitHub workflow to automatically review pull requests and identify potential bugs. We'll show you how to set up BugBot, trigger it on a pull request, and analyze the issues it finds, including a real-world example of it catching errors in AI-generated code from Google's Jules tool.