Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What We Got Right (and Wrong) about 2025

Watch now for a clear and candid look back at the predictions made for 2025 by Wallarm and by other voices across the industry. During the session, we revisit what people expected to happen in cybersecurity, API security, and the broader technology space, and compare those expectations with what actually unfolded throughout the year.

Start Where You Are: Resilience in Healthcare Begins With Action

In this episode of Building Cyber Resilience: A Healthcare Leader’s Guide, Josh Howell, Healthcare CTO at Rubrik, sits down with Heather Costa, Director of Technology Resilience at Mayo Clinic and Vice President at WiCyS Healthcare. Heather breaks down what it takes to build real resilience inside complex healthcare systems where downtime carries human consequences. She shares practical frameworks for prioritization, overcoming analysis paralysis, and aligning leadership around what matters when every minute counts.

Stop Ignoring This AI Bug! (Safety Security) #shorts

Are you confusing AI Safety with AI Security? In this clip, we break down why AI is a "Socio-Technical" system and why that matters for your code. We ask the expert: How do you handle "Safety Bugs" (like bias) versus traditional "Security Bugs" (like hacks)? The answer might save your next project. Subscribe for more AI Security insights! @protectoai.

Brivo Access: How to Set up the Bosch + Brivo Integration

The Bosch Intrusion Panel integration in Brivo Security Suite empowers customers to manage doors and alarms from a single platform, and automatically links security events to rapid responses. Learn how to set up the integration in this video. Explore the future of security and smart technology with Brivo. Our content delves into innovative solutions that empower businesses and individuals to create safer, more connected environments.

57% of Companies ALREADY BREACHED Through APIs (Your Company Is Probably Next) #apisecurity #api

82% of companies are going API-First in 2025 But here's the troubling fact: 57% of them have ALREADY been breached through APIs. Why? Because they're going API-first without a solid API security strategy. It's like buying a sports car and forgetting the insurance. Organizations are racing toward digital transformation while threat actors simply walk through the open door. Threat actors love when you're API-first without a good security program. It makes their job easier.

Security Starts With Context: The 3 Signals That Actually Drive Change

It's always a pleasure to sit down and chat with Ed. Good security decisions don’t start with alerts. They start with context. We rarely do anything in life without understanding some baseline of context. Otherwise, we're essentially "flying blind." Garrett breaks down the three signals that actually drive meaningful change:⇢ A clear baseline of how your environment really operates⇢ What’s happening in the outside threat landscape⇢ What your own history is already telling you in the context of your business.

Is your organization actually AI-ready? #cybersecurity #aisecurity #ainews

According to our CEO @Ev Kontsevoy, this isn't a "nice to have" anymore."It will be required if you don't want to fail." For the last two years, most companies have treated AI as an experiment. But as Ev explains in this clip, 2026 is the year AI graduates from the labs and enters production. This shift changes the requirements for everything – from how we secure identity, to who we hire. To help you navigate this transition, we’re breaking down Ev’s 2026 Cybersecurity Predictions.

Securing the Future of AI Browsing with 1Password and Perplexity

Join Anand, VP of Product and AI at 1Password, and Kyle Polley from Perplexity for a fireside chat about building the future of secure, AI-native browsing. 1Password and Perplexity are partnering to bring privacy, transparency, and trust to the Comet Browser — the world’s first AI browser and personal assistant. Learn why security must be built in from the start, and how end-to-end encryption and zero-knowledge architecture protect users in the age of AI.