Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security Priorities and Expectations: A Board Level Overview

Compliance. Reporting. Risk visibility. These are no longer checkbox exercises in the boardroom. Today’s boards expect more than confirmation that regulations are being met. With evolving threats and AI-driven risk, they want regular, structured visibility into vulnerabilities, before gaps turn into incidents.

Nightfall DLP 2026: Corporate v. Personal Session Differentiation | Live Demo

See the future of data loss prevention in action. This live demo showcases Nightfall's breakthrough session differentiation technology that intelligently blocks sensitive file uploads to personal cloud accounts while seamlessly allowing them in corporate environments.

Ep 27: 2026 Security operations insights

On this episode of Masters of Data, we dive into our 2026 Intelligent Security Operations report. While 90% of 500+ security leaders see AI/ML cutting alert fatigue, actual implementation remains stuck at basic anomaly detection—not the full automation everyone wants. The gap is real: only 51% say their SIEM effectively reduces detection and response times, exposing serious maturity issues. Add rampant tool sprawl (most orgs run 3-10+ security tools that don't communicate), and you've got an integration nightmare. We explore how Model Control Protocol and AI agents could solve this, but here's the truth.

Endpoint Central + PAM360: Bridging privileged access management and endpoint security

Nearly 80% of security breaches involve compromised privileged credentials, according to Forrester. Since privilege abuse is a major attack vector, managing privileged access and the associated attack surface is crucial. In this webinar, we explore how ManageEngine PAM360 and Endpoint Central can catalyse your journey toward achieving privileged access security—all within the unified ManageEngine ecosystem!

EP 24 - FOMO, identity, and the realities of AI at scale

In this episode of Security Matters, host David Puner sits down with Ariel Pisetzky, chief information officer at CyberArk, for a candid look at the fast‑evolving intersection of AI, cybersecurity, and IT innovation. As organizations race to adopt AI, the fear of missing out is driving rapid decisions—often without enough consideration for identity, security, or long‑term impact. Ariel shares practical insights on what it really takes to secure AI at scale, from combating AI‑enabled phishing attacks to managing agent identities and reducing growing risks in the software supply chain.

Business Logic Abuse: The Attack You Can't Patch #businesslogic #apisecurity #cybersecurity

The attack that no patch can fix Scenario:"Give me one million pizzas" API responds: "OK, one million pizzas at $0.01 each" Attacker: "Thanks!" What happened? API works exactly as designed Syntax is correct Protocol is followed WAF sees nothing wrong BUT the business logic intended: "Max 100 pizzas per order, at normal pricing".

How to integrate third-party APIs in Drupal

Learn how to create and manage Custom REST API endpoints in Drupal using the Custom API module. This step-by-step tutorial shows how to build APIs without writing complex backend code, using Drupal’s core REST and routing system. Comprehensive Documentation: Don't forget to subscribe to our channel and click on the bell icon to get notifications about new uploads.

How to Integrate ITSM in Managed Risk for Better Visibility and Faster Remediation

See how Arctic Wolf Managed Risk turns risk visibility into remediation through seamless integrations with partners like ServiceNow and ConnectWise. This demo shows how automated ticketing, unified workflows, and prioritized findings help security and IT teams accelerate remediation without added workload.