Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ServiceNow + SailPoint Transformation Done Right

In this episode, Dave Cox, VP of Identity Services and Ryan Cluff, Director - IGA Practice at Xalient, explore the critical integration between SailPoint and ITSM tools, with a special focus on ServiceNow. Learn how organizations transition from using ITSM tools for basic identity functions to full-featured Identity Governance (IG) with SailPoint—and why it's essential for scaling, compliance, and automation.

Securing AI: The New Frontier of API Security

A10 Networks' security experts, Jamison Utter, Diptanshu Purwar, and Madhav Aggarwal, discuss the security challenges of AI. They discuss the new world of API-enabled AI agents and the necessity for robust security controls. Learn how to prevent misuse within the enterprise as they explore data ingress/egress and API security in the context of large language models (LLMs).

Top 10 Privileged Access Management Software Solutions

Identity-related threats are draining time and resources faster than security teams can keep up. The challenge is no longer just about stopping breaches; it’s about keeping up with the scale of alerts and risks. On average, organizations spend 11 person-hours investigating each identity-related security alert. Meanwhile, credential theft has soared 160% in 2025, making privileged accounts and non-human identities (NHIs) a prime target for attackers.

Shopify Headless (Hydrogen) SSO for E-commerce

Headless commerce is changing the way e-commerce businesses operate, offering them more flexibility and performance. For Shopify merchants, using Shopify Headless Commerce with Hydrogen means more design freedom and faster storefronts. But don’t overlook one crucial element: Single Sign-On (SSO).

Enterprise AI Security Redefined: Protecto vs. Traditional DLPs

Protecto replaces the patchwork of DLPs and DSPMs with AI-native controls, so you can safely unlock enterprise data for AI. Prompts, models, and context power Agentic AI. But context is also the most volatile and exposed layer - where 90% of enterprise AI risks originate. Intellectual property loss, unauthorized access, privacy violations, compliance failures - all start in the context. That’s why Protecto brings Zero Trust controls to data in AI.

The case against secrets in .env files

Most developers rely on.env files to store secrets like API keys, database passwords, and tokens. But what if I told you this common practice can leave you wide open to attacks? In this video, I break down why storing secrets in a.env file is dangerous, how attackers can exploit it, and what safer alternatives you should be using instead.