Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

GitGuardian - protect your enterprise against leaked secrets and mismanaged identities.

We allow organizations to discover and remediate exposed Secrets as well as manage NHIs lifecycle across both their internal network and public perimeter (for ex over permissioned, stale secrets, secrets in multiple vaults…). Our unrivaled secrets detection engine is trained and backtested in real-time against +5Bn commits and used by more than 600k developers, it is also the n°1 app on the GitHub Market place. GitGuardian integrates natively with the SDLC (GitHub, Gitlab…) but also with other data sources such as Jira, Slack, ServiceNow, Docker, as secrets leak in all these environments.

Ep 5: A Cyber Detente

Every U.S. administration, dating back to President H.W. Bush has struggled to address the threat of Chinese trade theft. But a growing sense of urgency kicks in as American businesses start hemorrhaging trade secrets and entire product lines start vanishing to Chinese copycats. Just as the Obama Administration is set to do something about it, Edward Snowden shifts the narrative back onto the United States.

The Modern Kill Chain: An On-Demand Session from FCW, NextGov and Lookout

As federal agencies shift beyond perimeter defenses, cyber threats are evolving—targeting identity, data, and mobile devices at the front line of today’s attacks, which can now infiltrate systems and exfiltrate data in minutes rather than months. While Zero Trust provides the foundation for defense, starting with a simple mobile threat defense solution can break down modernization barriers. Learn how a mobile-first approach strengthens Zero Trust, accelerates modernization, and safeguards federal networks from the modern kill chain.

Can You Really Pair Program with AI? (Aider & Cohere)

A new wave of AI development tools is changing how we write code, but can AI truly replace a human coding partner? In this video, we explore the capabilities of Aider and Cohere, two tools built to support real-time, conversational pair programming. We’ll break down how they work, where they shine, and the surprising limitations that came up during testing. Whether you're an experienced developer or simply curious about the future of coding, this deep dive will give you a clear picture of where AI-assisted programming stands today.

#206 - The AI Threat Landscape Report w Eoin Wickens, Director of Threat Intelligence at HiddenLayer

On this episode of the Cybersecurity Defenders Podcast we dive into the AI Threat Landscape report with Eoin Wickens, Director of Threat Intelligence at HiddenLayer. Eoin specializes in AI security, threat research, and malware reverse engineering. Eoin has authored numerous articles on AI security, co-authored a book on cyber threat intelligence focusing on Cobalt Strike, and has spoken at conferences such as DEF CON AI Village, BSides San Francisco, LABScon, and 44CON. He also delivered the 2024 SCORED opening keynote.

Brivo Access: How to Create Users and Assign Credentials

A User is any person who has been given a credential and generally has access to at least one door. Users are assigned to Groups, which are assigned door and device permissions. This video details how to create a new user, assign to a group or groups, and assign various credential types. Explore the future of security and smart technology with Brivo. Our content delves into innovative solutions that empower businesses and individuals to create safer, more connected environments.

Brivo Access: How to Add Cards

A card is a type of access control credential that provides a secure and auditable method for verifying a user's authorization to enter restricted spaces. This how-to video will provide the steps needed to add or remove cards from your Brivo Access account. Explore the future of security and smart technology with Brivo. Our content delves into innovative solutions that empower businesses and individuals to create safer, more connected environments.