Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Cassie Crossley on Cybersecurity Challenges in Modern Supply Chains

Supply Chain Security: A Complex Web of Risks and Responsibilities The supply chain for a single device involves thousands, potentially millions of people over time. It's far too large a topic to fully grasp everything. I talk daily with folks about hardware specifics, human rights management, materials, chemical makeups and more. It's much more than just the bits and bytes we normally see.

TLS Inspection Made Safe & Simple: A Game-Changer from Cato!

Experience how Cato Networks' revolutionary Safe TLS Inspection eliminates the complexity of inspecting encrypted traffic without impacting performance or user experience. In this demo, see how Cato’s data-driven, automated approach selectively inspects only safe-to-inspect traffic, enabling organizations to uncover hidden threats, prevent data leaks, and fully leverage advanced security features like CASB and DLP. Discover how simple it is to activate this game-changing feature, unleashing the full potential of the Cato SASE Cloud with just a few clicks.

The Howler Episode 15: Debra Sevelius, VP of Legal

This month we sit down with Debra Sevelius, Vice President of Legal, as she shares the "glamorous side of commercial legal," her love of curling, and much more! As the Head of Commercial Legal at Arctic Wolf, Deb is an experienced, collaborative, globally-minded executive leader, with a proven record in leading legal and cross-functional operational teams that deliver pragmatic win-win outcomes that maximize long term value, achieve process efficiencies, and increase revenue.

2025 Internet predictions (AI included) with John Graham-Cumming

Join host João Tomé and Cloudflare's CTO John Graham-Cumming for the final episode of "This Week in Net" in 2024, broadcasting from a rainy Lisbon, Portugal. The conversation reflects on Cloudflare's achievements throughout the year, including significant developments in Workers platform, AI capabilities, and hardware innovations. The episode explores predictions for 2025, examining the intersection of AI and privacy, quantum-resistant encryption, and cybersecurity threats. John Graham-Cumming shares his perspective on how AI capabilities will become more seamlessly integrated into daily life.

Falcon Cloud Security Asset Graph: Demo Drill Down

Gain the edge in the race against adversaries by leveraging unified visibility across your attack surface—from endpoint to cloud. See how Falcon Cloud Security's Asset Graph uncovers vulnerabilities, highlights misconfigurations, and automatically maps the complete attack trajectory, empowering you to respond faster and mitigate threats effectively.

Perimeter Security vs Cyber Resilience: CSPM vs DSPM

In this episode of Into the Breach, James Purvis is joined by Noam Perel to explore the key differences between CSPM (Cloud Security Posture Management) and DSPM (Data Security Posture Management). They dive into how these tools address different problems, their unique approaches to security, and why organizations benefit from leveraging both. Discover how DSPM’s data-centric approach complements CSPM’s infrastructure focus, the distinct personas driving each, and how together they provide a stronger, more resilient security posture.