Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Data Scientist's Take: Making AI Work for the Enterprise

In retrospect, it’s a lot easier to determine whether or not something has been overhyped. But for the moment? We’re bullish on agentic systems – and their adoption. Is your enterprise ready for the age of autonomous AI? Join Aleksandr Yampolskiy (CEO & Co-Founder, SecurityScorecard) and Ilya Mezyin (SVP, Head of Data Science, Dun & Bradstreet) for this discussion on: SecurityScorecard monitors and scores over 12 million companies worldwide. Find your company's security score for free at SecurityScorecard.com.

Streamlining Multifamily Ops: How The Caroline Integrated Brivo & Entrata for Total Property Control

Managing 336 units across 14 buildings is no small feat. Discover how The Caroline, a premier multifamily community, transformed their property management by integrating Brivo access control, Eagle Eye Cloud VMS, and Entrata PMS. In this video, we go behind the scenes with Community Manager Lauren Graff to see how they eliminated manual re-keying, achieved 100% mobile adoption, and created a frictionless "mobile-first" experience for their residents.

The Right Business Outcomes #Protegrity #cybersecurity #datacentric #ai #datasecurity

We are at an inflection point where AI, compliance, and quantum are exposing the dangerous fragility of traditional "envelope" security. The organizations that thrive in the next decade will be those that set their data free by embedding deterministic protection directly into the data itself. The organizations that lead the next decade won't just have better AI, they'll have better data security. Visit Protegrity.com to learn more.

Episode 6 - Detecting DNS Covert Channels in the Wild (Part 2)

In Episode 6 of Corelight DefeNDRs, we delve deeper into the fascinating world of DNS covert channels with Vern Paxson, our chief scientist and co-founder. Continuing from our previous discussion, Vern shares his insights on techniques developed to detect these stealthy channels utilized by intruders to evade security measures. We explore the innovative approach of leveraging time series analysis of DNS lookups, how to distinguish benign traffic from potential threats, and the real-world implications of our findings across significant datasets.

Exploit Intel & Detected Products - Tanium Comply - Tanium Tech Talks #153

Cut through vulnerability noise! Learn how Tanium Comply’s new Exploit Intel, Endpoint Criticality, and Detected Products help you prioritize and remediate faster. What you’ll learn: Why CVSS alone isn’t enough How EPSS and exploit maturity change the game Dynamic criticality rules for business impact Detected Products for pinpoint remediation Visualize risk with the Exploitability Dashboard.

EP 23 - Red teaming AI governance: catching model risk early

AI systems are moving fast, sometimes faster than the guardrails meant to contain them. In this episode of Security Matters, host David Puner digs into the hidden risks inside modern AI models with Pamela K. Isom, exploring the governance gaps that allow agents to make decisions, recommendations, and even commitments far beyond their intended authority.

Stop buying niche tools to secure your AI. #cybersecurity #aisecurity #engineering

In his first prediction for 2026, Ev explains why that strategy is about to fail. We used to let microservices run anonymously because we had bigger fires to fight. But when all software becomes autonomous AI, anonymity is a risk you can't afford. If your software behaves like a human, why separate it from your human identity strategy? The future isn't "NHI." It's a Unified Identity Layer where humans and non-humans are managed as equals.