Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Find and Redact Your Data With Protegrity Developer Edition

Dan Johnson, a software engineer at Protegrity, demonstrates how to use the Protegrity Developer Edition to identify and redact Personally Identifiable Information (PII) from unstructured text. Building on our installation guide, we walk through real-world use cases using the Python SDK and Core Edition to transform "useless" raw data into secure, usable information for your AI and ML workflows.

Automating User Access Reviews: How IGA Delivers Real Business Value

Still managing user access reviews manually? You’re not alone — and it’s costing you. This teaser highlights how automated User Access Reviews (UARs can reduce effort, improve audit readiness, and deliver real business value. In the full webinar, CyberArk experts share real-world examples, ROI insights, and how automation can cut review effort by up to 80%. Watch the full webinar on our website to learn how automated IGA transforms access reviews from a burden into a business advantage.

CVE-2025-55131: Node.js Memory Exposure Risk

Node.js patched a serious vulnerability (CVE-2025-5513) that could expose uninitialized memory and leak secrets like tokens or application data due to a race condition in the buffer allocation logic. This vulnerability affects the vm module with timeouts and is part of a broader coordinated security update across all active Node.js release lines.

Hiring fraud and deepfakes with Tom Cross

Join us for this week's Defender Fridays as we explore the evolving threat of deepfakes in hiring and remote work with Tom Cross, Head of Threat Research at GetReal Security. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

How to Protect Your AI Agents from Invisible Risks? | IdentityShield '26

AI agents power innovation but face hidden hacks, leaks, and tricks. This session uncovers 7 key risks, like cyberattacks, insider threats, bias abuse, and rogue actions, with best practices and real demo videos. Speaker: Vipika Kotangale Technical Content Writer, miniOrange Pune, India.

Getting started with Source Code Reviews | IdentityShield '26

Secure coding starts with deeply understanding code and vulnerabilities, and secure code reviews are crucial in finding issues early. In this hands-on secure code review workshop, we will teach the participants how to perform effective code reviews with both manual and automated techniques. Speaker: Prateek Thakare Senior Security Engineer, GoDaddy Bengaluru, India& Gaurav Bhosale Senior Application Security Engineer | Ex-10xbanking, Mastercard, Payatu Indore, India.

Your API Is the New Titanic (Iceberg Already Here) #apisecurity #cybersecurity #riskmanagement #api

The Titanic didn't hit the iceberg by accident. Organizations hit the API security iceberg for the same reason: they didn't see it coming. Your API iceberg consists of: Public APIs — for customers (SaaS, partners, third-parties) Private APIs — internal infrastructure (larger companies = larger insider threat surface) Partner APIs — for ecosystem integration AI APIs — the new frontier (and the most dangerous)