Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

How API Security Changed in 2024: Key Insights #TechTrends #APISecurity #CyberSecurity2024

Wallarm’s 2024 API Security Reports reveal that new APIs are discovered in just 29 seconds. Attackers use batching techniques like GraphQL to extract millions of records in minutes. Learn how to protect your APIs from rapid data theft and evolving threats.

Introducing the Ivanti ITSM & Protecto Partnership: Enabling Secure Data for AI Agents

Discover how Protecto secures data within Ivanti ITSM APIs to prevent data leaks, privacy violations, and compliance risks. In this video, we’ll show how Protecto acts as a data guardrail, ensuring that sensitive information like PII and PHI is identified, masked, and handled securely before it reaches AI agents. Participants: Amar Kanagaraj, Founder & CEO of Protecto Kalyan Vishnubhotla, Director of Strategic Partnerships, Ivanti.

AI Powered Data Classification: A Game Changer or Just Hype?

In this episode of Into the Breach, James Purvis, Drew Russell, and Dan Eldad dive into the exciting yet complex world of AI-powered data classification. Is it truly a game changer, or just overhyped? They explore the potential of AI to revolutionize data classification, its limitations, and where traditional methods still hold value. The discussion also covers practical use cases, cost implications, and the future of AI in data security.

CISO Liability: Why Managing Breaches Matters More Than Stopping Them

How can CISOs protect themselves from liability? Today’s security leaders must focus on breach response, not just prevention. This clip explores why CISOs are increasingly being held accountable for cyber incidents and how to shift towards strategic risk management.

The Cost of Being a CISO Part 2: Ethics, Leadership and Strategic Impact

Welcome back to Razorwire! I'm your host, Jim, and in this second part of our CISO Dilemmas series, we welcome back security experts Oliver Rochford and Richard Cassidy. Moving beyond the challenges covered in part one, this episode explores the rewarding aspects of the role while taking a frank look at the ethical issues security leaders regularly face. The guests share personal experiences and practical actions for transitioning from technical expertise to strategic leadership, building effective teams and managing relationships across the business.

Demo: Tanium Autonomous Endpoint Management (AEM) in action

This end-to-end demo of Tanium AEM will guide you through the foundational automated capabilities of the Tanium platform. Tanium AEM leverages real-time insights from all Tanium cloud-managed endpoints to recommend and automate changes on endpoints within a customer’s environment in a safe, scalable way with its real-time platform. It empowers IT and Security teams to confidently and efficiently scale operations and improve the security posture of the environment.