Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Smarter API Security Demo: See How Wallarm Protects Modern APIs and Agentic AI

Modern APIs are under constant attack—from botnets to logic abuse to threats targeting Agentic AI. Most security tools lag behind. Wallarm doesn’t. Join us for a live walkthrough of Wallarm’s advanced API security platform. In this session you will see how to instantly discover vulnerable endpoints, protect business-critical flows, and stop API abuse—without slowing down your teams. What you'll learn.

From Chaos to Clarity: How to Modernize Vulnerability Management

Fragmented tools. Manual data wrangling. Burned-out teams. Sound familiar? In this expert roundtable with Trey Ford (CISO, Bugcrowd) and Jeff Gouge (CISO, Nucleus Security), we break down how today’s security leaders can transform vulnerability management from a chaotic, spreadsheet-driven burden into a unified, automated, and trusted function. Watch to learn.

Tackling Technical Debt to Secure and Streamline Federal Networks

In today’s dynamic threat landscape, technical debt isn’t just a budgeting headache—it’s a growing national security risk. According to McKinsey, technical debt consumes up to 20% of engineering and DevOps capacity across large enterprises. For U.S. federal agencies—defense and civilian alike—the cost of carrying outdated, unsupported infrastructure goes far beyond inefficiency.

What is the UK Cyber Security & Resilience Bill and Why Does it Matter to Your Business?

The Cyber Security & Resilience Bill is designed to tighten the grip on security standards across businesses, making resilience against cyber threats an absolute necessity. By expanding regulatory frameworks, it aims to bridge existing gaps and provide a structured approach to combating cyber threats, which have increasingly targeted vital business operations.

HPE Zerto Names 11:11 Global Partner of the Year

The famous Hall of Fame and Olympic basketball coach John Wooden once said, “Winning takes talent, to repeat takes character.” With that in mind, we are thrilled that 11:11 Systems is part of those in the “repeat” category. We have just been awarded the Zerto Global Partner of the Year for 2024, the fifth prestigious recognition from Zerto, a Hewlett Packard Enterprise Company.

What Is an Advanced Persistent Threat (APT)?

If the term “cyber threat” alone is enough to make any company nervous, imagine a sophisticated cyberattack designed not only to infiltrate but to remain hidden within a network for extended periods. These threats are real, but they can also be countered. Let us introduce you to the infamous APTs or advanced persistent threats.

EP 10 - A new identity crisis: governance in the AI age

In this episode of Security Matters, host David Puner sits down with Deepak Taneja, co-founder of Zilla Security and General Manager of Identity Governance at CyberArk, to explore why 2025 marks a pivotal moment for identity security. From the explosion of machine identities—now outnumbering human identities 80 to 1—to the convergence of IGA, PAM, and AI-driven automation, Deepak shares insights from his decades-long career at the forefront of identity innovation. Listeners will learn.

Balancing act: Sumo Logic vs. Splunk in the high-wire world of modern security

Trying to stay ahead in cybersecurity can feel a bit like juggling gas-powered chainsaws while riding a unicycle across a tightrope—dangerous, noisy, and not for the faint of heart. Thankfully, security information and event management (SIEM) tools are your safety harness—keeping you steady, secure, and just far enough from the edge that you’re not plunging headfirst into the abyss of breached data, regulatory fines, and sleepless nights.

How EDR evasion is changing threat detection

Endpoint Detection and Response (EDR) and Security Information and Event Management (SIEM) have become integral to modern SecOps architecture and threat detection capabilities. However, the urgency of the situation is clear—attackers are deploying increasingly sophisticated techniques to bypass threat detection centered on these systems.