Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Can Google Jules Build a SECURE Note Taking App?

In this video, I test out Google Jules, Google’s brand new AI developer assistant, to see if it can build a secure note-taking app from scratch. With a focus on privacy, authentication, and data protection, I challenge Jules to create something functional and secure. This is part of an ongoing series where I test different AI models and tools to see how well they handle real-world development tasks. Check out our playlist where we're putting these various models to the test!

How to Fix the Challenges with Web App Firewalls

How to Fix the Challenges with Web App Firewalls Is your WAF enough? A10 experts Jamison Utter and Gary Wang delve into advanced security strategies that surpass traditional web application firewalls (WAFs). In today’s ever-evolving threat landscape, organizations face numerous security challenges that necessitate a shift from conventional WAFs to next-generation solutions.

Pen Testers Save the Day: Exposing Critical Vulnerabilities! #cybersecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Automating application and security risk assessments for ServiceNow & Splunk customers

Last week, our CEO, Sravish Sridhar, announced that TrustCloud secured $15 million in new funding from ServiceNow Ventures, Cisco Investments, and others. In his words, the raise “validates the urgent need to modernize GRC for enterprise CISOs and unify CISOs and chief risk officers around a shared view of risk.” The new capital accelerates our mission to automate governance, risk, and compliance for every security team – no matter which system of record they live in.

Red Teaming Around the World (UK and Europe vs. US)

The differences between the US, the UK, and Europe are often minor but important regionally. Sometimes, we use different words to describe the same thing: French fries (US) vs. chips (UK) vs. pommes frites (France) are all fried potatoes. Sometimes, the same word can have different meanings, such as "football" and "football". Oddly, the same point holds true for Red Team testing.

NIST CSF 2.0: What you need to know by Jason Taylor

Join Jeson Taylor, Senior Cybersecurity Program Analyst, as he breaks down the key updates in NIST CSF 2.0 in this informative webinar. Gain valuable insights into what’s changed from NIST CSF 1.1 to 2.0, and what organizations need to know to stay aligned with the latest cybersecurity framework. This is the recording of our live webinar—perfect for anyone looking to understand the evolution of NIST CSF and how it impacts security programs moving forward.

Discover and secure shadow IT with 1Password Extended Access Management

Shadow IT has been a concern of IT and security teams since SaaS became mainstream. However, as SaaS has become increasingly decentralized and employees are more and more tech-savvy, the security issues associated with shadow IT have only become more prevalent. Recent research backs this up. Needless to say, employees are signing up for software and services outside of IT’s purview.