Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How To Get Your Staff to Actually Care About Cybersecurity

Is Security Awareness Broken? Amy Stokes-Waters & Jemma Think So Traditional security training is failing — here’s how to fix it. In this episode of Razorwire, host James Rees is joined by security awareness experts Amy Stokes-Waters and Jemma from CultureGem for an honest conversation about what’s really wrong with security training.

Achieve AI-Driven Policy Hygiene & Eliminate Policy Sprawl

Firewall policies are essential, but over time, they become cluttered, misaligned, and hard to manage. That complexity puts Zero Trust and audit readiness at risk. Cato’s Autonomous Policies for Firewall as a Service (FWaaS) change that. This video shows how Cato applies AI to continuously assess and optimize your firewall policy set, removing outdated rules, identifying gaps, and simplifying ongoing management.

Driving Cybersecurity with Privileged Access Management

In the fast-paced world of Formula 1, every second matters — both on the track and in the cockpit. As cyber threats continue to evolve, businesses need a solution that performs at the speed of their operations. Keeper Security’s privileged access management solution protects critical data in real-time, ensuring secure access and preventing breaches. With zero-trust and zero-knowledge security, Keeper delivers powerful protection.

Is Your Code Safe? Hidden Risks & Security Measures | Mend.io #cybersecurity #softwaresecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

In cybersecurity, it's an arms race.

In cybersecurity, it's an arms race. Stephanie Cohen explained why financial services are prime targets and why strong partnerships are the real armor. Banks are one of the most attacked sectors on the planet. It's not just money at stake; it's entire economies. And here’s the kicker: You're only as strong as your weakest link. Ready to rethink your cybersecurity strategy? Dive into the latest episode of The Connectivity Cloud Podcast.

80s to AI - Career Talk - Tanium Tech Talks #127

A fire side chat from the heart with Ashley, reviewing 40 years in technology and career advice for uncertain times. What is the meta-narrative of a technology career? How can I differentiate myself in the tech career field? How can I differentiate myself among other job applicants? What is the next fun tech I could tackle? How do you keep a lifelong career fresh and fun? What are my options in a tech career?

Bridging ASPM and Vulnerability Management for Scalable Application Security

In this webinar, "Bridging ASPM and RBVM for Scalable AppSec," security leaders from Cycode and Nucleus explore how to unify application and infrastructure vulnerability management in complex, cloud-native environments.