Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

We need to redefine "critical infrastructure" #cybersecurity #ransomware #criticalinfrastructure

When a city gets hit with ransomware, residents can't pay utility bills, access emergency services, or even get married. When the water treatment plant goes down, the hospital can't operate, no matter how well you've secured it. We've been asking the wrong question. Instead of "does this technically qualify as critical infrastructure?" we should be asking "who needs help?" Small organizations like schools, nonprofits, water systems, and local governments face the same cybersecurity challenges but lack the resources to defend themselves.

A CISO's Guide to API Security

APIs are powering digital transformation but also exposing organizations to new risks. Securing them requires collaboration between CISOs, CIOs, and the board. This webinar will demystify the evolving API threat landscape, outline governance strategies, and provide leaders with the tools to communicate API risk in business terms. Key Learnings: Why You Should Attend.

IAM Principal Consultant & Head of Center of Excellence One Identity - iC Consult

iC Consult’s partnership with One Identity has gone back a long time, thanks to the comprehensive One Identity portfolio of unified IAM solutions. Join Oliver Paulzen to explore the advantages of the iC Consult-One Identity partnership and the benefits of the integrated solutions that make up the One Identity Fabric.

Give First: Shifting to an Abundance Mindset in IT with Venture Capital Legend Brad Feld

In this installment of Make Work Happen, we're joined by Brad Feld, partner at Foundry Group, to dive into the powerful "Give First" philosophy that has shaped the Boulder startup community for decades. Brad discusses his career, from starting his first company 40 years ago to co-founding Foundry Group and Techstars. We explore how core values, or cultural norms, like non-transactional, positive-sum, multi-turn relationships, can define the success of a business or a community.

A step-by-step guide to AI security assessments [With a template]

As artificial intelligence becomes deeply integrated into business operations, organizations have started feeling the pressure to keep up. According to Vanta’s 2025 survey, more than 50% of the organizations report being overwhelmed by the speed of AI adoption and growing compliance obligations. ‍ This issue is aggravated by the fact that AI tools evolve faster than governance policies can adapt, potentially leaving complex gaps for security teams to fill.

Exposed, Misconfigured and Forgotten: The Triple Threat of External Risk (and how to fix with Cloudflare and IONIX)

If popular TV and movies are to be believed, hackers break into organizations from dark rooms using flashy zero-day exploits (complete with some sort of showy animation), all while techno music blares in the background, culminating in the oh-so-cool announce of “I’m in!” This… is not reality. The unglamorous truth is that breaches usually stem from a series of small mistakes in unremarkable things: A system that was overlooked when implementing a new policy.

Tackling the Modern WAF Challenge: Why Managed WAAP Is the Key to Effective Application Security

Organizations today face a continuous struggle to secure their web applications against threats that constantly evolve in the fast-paced digital landscape. The Web Application Firewall (WAF) serves as a primary line of defense against these threats; however, its management challenges often outweigh its security benefits, resulting in organizations not realizing the full value of their security investment.

EP 17 - Privilege creep and the machine identity surge: Securing the modern enterprise

The conversation explores the dangers of privilege creep, the explosion of machine identities, and why accountability at every point of interaction is essential for building resilient teams and systems. Chris shares insights on the risks of unmanaged access, the impact of AI and automation on both defense and attack strategies, and practical advice for CISOs and boards on managing identity risk while enabling business transformation..