Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Dangerous Reason CISOs Get Sidelined

Security leaders are not ignored because governance or risk no longer matter, they are sidelined because speed and efficiency are treated as the only metrics that count. AI is sold as a competitive edge, so any warning about second order effects sounds like friction, even though speed without control creates asymmetric risk that grows out of sight.

The New CISO Podcast Ep. 140 - Manuel Ressel | The Four Cs: Why a Schoolteacher Makes a Great CISO

In this episode of The New CISO, host Steve Moore speaks with Manuel "Manu" Ressel, CISO at SAUTER Group, about his unconventional journey from classroom teacher to cybersecurity leader—and why the "Four Cs" of modern education provide a powerful framework for building effective security programs. Drawing from years as both a teacher and school principal in Germany, Manu introduces Critical Thinking, Communication, Collaboration, and Creativity as essential leadership skills that fundamentally challenge how the industry approaches awareness training and incident response.

Introducing Forward AI

The Network is Complex. Operating It Shouldn't Be. Forward AI transforms network operations by reducing manual analysis, expert dependency, and guesswork. By combining conversational interaction with a mathematically accurate digital twin, teams can validate intent, understand actual network behavior, and act with confidence across even the most complex environments.

AI is Actively LEAKING Your Data (And You Don't Know It) #apisecurity #airisks #dataprotection #ai

AI agents don't think. They pattern-match. Critical to understand: Generative AI (ChatGPT, Claude, etc.) does NOT reason like humans. It: The API Security problem: When you give an AI agent access to an API, it will: AI agents can't reason. They recreate patterns based on weights. You need to be very careful: data in, data out. Practical example: text User: "Show me the account balance for user" AI agent → calls GET /api/account/123 API → returns { balance: 5000, name: "John", SSN: "123-45-6789" } AI agent → outputs EVERYTHING to user (including SSN!)

Fast, Secure, Resilient: Modernizing Application Security at Scale

Software release cycles are now too fast for traditional security tools. Rapid iterations and reliance on open-source and cloud-native tech increase vulnerabilities, challenging AppSec teams to keep up. Attackers are taking advantage, targeting applications and exploiting misconfigurations, excessive permissions, and vulnerable plug-ins.

GitProtect 2.1.0 Overview : Jira Granular Backup and other new features

What Xopero ONE and GitPortect 2.1.0 release bring? Jira Granular Backup, backup & restore for Azure DevOps Artifacts, extended protection coverage for GitHub Projects by draft issues, and much more. Watch the video where we’ve broken down what’s new in our latest release and why it matters for DevOps and Jira Admins.

Building a Zero-Compromise Backup and Disaster Recovery Strategy for 2026 | Webinar

As cyber threats evolve and hybrid IT environments become the norm, traditional backup strategies are no longer enough. In this practical and forward-looking webinar, learn how IT teams and MSPs can build a zero-compromise Backup & Disaster Recovery (DR) strategy for 2026—designed to withstand failures, ransomware attacks, and operational complexity. What you’ll learn: How to design a failure-proof Backup & DR architecture.

Episode 7 - Practical AI for Zeek, MITRE, and Security Docs

In Episode 7 of Corelight DefeNDRs, join me, Richard Bejtlich, as I sit down with Dr. Keith Jones, Corelight's principal security researcher, to discuss the practical applications of AI in enhancing network security. We delve into how large language models (LLMs) can assist in cleaning up documentation and generating Zeek scripts, sharing insights from our extensive experience in incident response and coding. Keith reveals the challenges and successes he has encountered using LLMs to streamline processes, including their role in analyzing MITRE techniques.