Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Sophos Firewall: Back up and restore firewalls

A step-by-step tutorial showing you how to back up and restore your Sophos Firewall. You'll learn about the different backup modes, secure storage master key (SSMK), and best practices for firewall backups. Next, you'll learn the steps to create a firewall backup, back up your configuration to Sophos Central, and restore backups to the same or different firewall model. Ask questions and get expert answers in the Sophos Community.

AI-Powered Data Detection That Actually Works: 95% Precision, Zero Regex | Nightfall Product Launch

Tired of drowning in false positives? See how Nightfall's AI-powered detection achieves human-level accuracy and makes DLP automation possible. See three breakthrough capabilities from Nightfall: Prompt-based entity detectors - Protect custom IDs with natural language (no regex!) 23+ AI file classifiers - Detect source code, HR files, customer lists automatically Custom classifiers - Build your own in minutes with one sample file.

Agentic SecOps Workspace (ASW) office hours with LimaCharlie

Join us for a special Defender Fridays Office Hours session where the LimaCharlie team demonstrates the new Agentic SecOps Workspace (ASW) and explores what's possible when AI agents operate security infrastructure directly. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

What's Making 2026 the Toughest Year Yet for CISOs

What threats should CISOs prioritise as we move into 2026? Welcome to Razorwire, the podcast where we share our take on the world of cybersecurity with direct, practical advice for professionals and business owners alike. I’m Jim and in this episode, we’re looking ahead to the challenges facing security leaders in 2026. I’m joined by Richard Cassidy, EMEA CISO at Rubrik, and together, we discuss the three themes dominating CISO conversations.

Semantic Guardrails for AI/ML - Protegrity AI Developer Edition

In this installment of our AI Developer Edition Set-up series, Dan Johnson, a software engineer at Protegrity, introduces semantic guardrails. Learn how to protect your LLM and chatbot workflows from malicious prompts and insecure AI responses. As AI becomes central to enterprise operations, controlling the context of conversations is a major challenge. Semantic guardrails provide a safety layer that ensures your AI stays on topic and never leaks sensitive PII.

First 72 Hours of a Cyber Incident: How GRC & Security Teams Must Respond Together

When a critical vulnerability is exploited, the first 72 hours of a cyber incident can determine the outcome. In this scenario-driven webinar, Bitsight experts break down how security, GRC, and threat intelligence teams must work together—fast—to detect risk, prioritize action, and communicate clearly under pressure.

Cyber Risk in 2026: Top Threats, AI Risks & What Security Leaders Must Do Next

Cyber risk is evolving fast—and 2026 will demand more from security leaders than ever before. In this forward-looking webinar, Bitsight Co-Founder Stephen Boyer and SVP Vanessa Jankowski break down the biggest cyber threats shaping the year ahead, from AI-driven attacks and expanding attack surfaces to third-party and cloud risk.