Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Rise of Industry-Specific Cyber Defenses

You've probably noticed that digital security no longer feels like a background process. It's front and centre in boardrooms, startup pitches, and industry expos. But here's what's quietly shifting beneath the headlines: cybersecurity is splintering. What used to be a generic layer of protection is now becoming something deeply tied to a business's core operations. Hospitals aren't just worrying about hackers-they're defending against threats that target how medical records are shared.

How Professional Photography Has Changed Over the Last Decade

Over the past decade, professional photography has undergone a significant transformation, driven by technological advancements and evolving client expectations. The shift from traditional DSLRs to mirrorless cameras has provided photographers with lighter, more versatile tools, enhancing mobility and efficiency on shoots. Simultaneously, the rise of computational photography, particularly in smartphones, has empowered amateurs to capture high-quality images, increasing competition in the industry.

How to Secure MCP Servers | A Walkthrough

While the hype continues to build around MCP, or model context protocol, a growing number of engineers and organizations are becoming concerned about the potential security risks that MCP invites. In this video, I'll give a demo of how Teleport provides secure access to your MCP servers and how the new Teleport Secure MCP integration gives you a robust solution for protecting your LLM endpoints and data sources.

June 2, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: MATLAB dev confirms ransomware attack behind service outage MathWorks, the developer of the popular MATLAB numeric computing platform and the Simulink simulation, has disclosed it suffered a ransomware attack beginning on May 18, 2025. The attack impacted online applications used by customers as well as internal staff systems.

Can Google Jules Build a SECURE Note Taking App?

In this video, I test out Google Jules, Google’s brand new AI developer assistant, to see if it can build a secure note-taking app from scratch. With a focus on privacy, authentication, and data protection, I challenge Jules to create something functional and secure. This is part of an ongoing series where I test different AI models and tools to see how well they handle real-world development tasks. Check out our playlist where we're putting these various models to the test!

How to Fix the Challenges with Web App Firewalls

How to Fix the Challenges with Web App Firewalls Is your WAF enough? A10 experts Jamison Utter and Gary Wang delve into advanced security strategies that surpass traditional web application firewalls (WAFs). In today’s ever-evolving threat landscape, organizations face numerous security challenges that necessitate a shift from conventional WAFs to next-generation solutions.

Pen Testers Save the Day: Exposing Critical Vulnerabilities! #cybersecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.