Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How To Reduce Your Attack Surface with Secure Password Management

With the rise of remote work, cloud computing and mobile devices, your organization’s attack surface is larger than ever. Watch this short video to learn what an attack surface is, how to identify security vulnerabilities and five ways to minimize your attack surface.

Is Windsurf's SWE-1 Model a Game Changer? Let's See...

In this episode of my ongoing series testing AI coding tools, I put Windsurf’s latest model, SWE-1, to the test. The challenge? Build a secure note-taking app from scratch. I’m looking at everything from how it handles authentication and encryption to whether the code is clean, usable, and actually secure. If you're curious about how SWE-1 stacks up against other AI dev tools like GPT-4 or Claude, this video is for you.

Staying Ahead of Evolving Cyber Threats: What Security Teams Need to Know

Dan Bradbury, Chief Product Officer at UpGuard, kicks off our 20th Summit with a look at how far we’ve come—and where we’re headed. From AI-powered risk assessments to expanded threat intelligence, discover what’s new, what’s next, and how your feedback continues to shape our roadmap.

From Compliance to Cyber Resilience: Leadership Lessons from the Frontline

In this fireside chat, Randy Vickers, Deputy CISO at the National Student Clearinghouse, shares hard-earned lessons on securing sensitive data at scale, navigating vendor risk, and leading high-impact security programs—especially when budgets are tight and threats are evolving fast.