The New CISO Podcast Ep. 139 - Alex Rice | Safety Third: Why Security Shouldn't Be Your Top Priority

In this episode of The New CISO, host Steve Moore speaks with Alex Rice, Founder, CTO, and CISO at HackerOne, about challenging one of cybersecurity's most deeply held beliefs—that security should be the top priority. Drawing from his journey building security programs at Facebook and founding HackerOne, Alex introduces the "safety third" philosophy and explains why accepting that security is never first can actually make you more effective as a leader.

What is AI Security? The CTO's Guide to Securing LLMs & Models

Here’s an unsettling truth: While 80% of organizations are adopting AI, only 6% have any form of AI security strategy in place (SandboxAQ 2025 AI Security Benchmark report). It’s like buying a Porsche 911 without locks or keys, a cash-guzzling public service car whose cost you’re apparently happy to bear.

Initial Attack Vectors: How Most Cyber Attacks Begin

Malicious actors use different tactics to launch cyberattacks, commonly referred to as attack vectors. They exploit misconfigurations, weak controls, and other poor security practices to gain unauthorized access to victims’ systems. There is a document co-authored by cybersecurity authorities from various countries, like the US, Canada, the UK, the Netherlands, and New Zealand. It is released by CISA (Cybersecurity and Infrastructure Security Agency).

How to Build an API Security Strategy: The Complete Guide (2026)

Today, APIs power everything from mobile apps to cloud platforms, quietly moving data behind the scenes. That invisibility makes them prime targets. Over 84% of organizations experienced API security incidents last year, with breaches exposing ten times more data than in traditional attacks. Attackers now deploy AI-powered tools that map endpoints in minutes and exploit business logic flaws your defenses can’t see.

Top 10 Challenges in DevSecOps Adoption

Integrating security into the software development lifecycle (SDLC) is no longer optional. DevSecOps adoption promises to bridge the gap between development speed and security rigor, enabling teams to build secure software faster. However, the path to a mature DevSecOps practice is filled with obstacles. Understanding these challenges is the first step toward overcoming them. This post outlines the top 10 challenges that hinder effective DevSecOps adoption.

Savanti: How Agentic AI Supercharge Cato's R&D Efficiency

Savanti is Cato Networks’ internal, agentic AI assistant that blends knowledge from Slack, Confluence, Git, and Jira to provide instant, context-rich answers. Savanti routes each query through an adaptive reasoning workflow by choosing between direct, deep, or multi-step reasoning based on the question’s complexity. Every answer is grounded in real internal context, backed by citations, and evaluated for confidence before being delivered.

NIS2 compliance: what it means, who's affected, and how to comply

NIS2 is the EU's comprehensive cybersecurity directive requiring essential and important entities to implement robust risk management, incident reporting within 24 to 72 hours, and supply chain security. Penalties can reach €10M or 2% of global turnover. Netwrix solutions help organizations support compliance through data security posture management, identity management, privileged access management, and audit-ready reporting.

Cloud and Platform Migration: Cost, Risks, and Best Practices for Enterprises

In today's fast-evolving digital economy, staying competitive has nothing to do with relying on legacy systems. Even if your aging solution seems to be reliable because you're so accustomed to it, you'll definitely face blockers while trying to scale or innovate. Without modernized software.