Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ISO 27001 beyond IT: Building a culture of security across the enterprise

The digital era has spurred organizations to rethink how they protect sensitive data, necessitating a robust and holistic approach to security. Although ISO 27001 is widely recognized as a framework for managing IT security, forward-thinking leaders are discovering that its principles can be extended far beyond IT departments.

SOC 2 Compliance for SaaS Companies

Is your SaaS company struggling to close those big enterprise deals? Chances are, they're asking for SOC 2 compliance – and for good reason! A staggering 82% of enterprises demand SOC 2 compliance from their SaaS vendors to mitigate data breach risks (Cloud Security Alliance, 2023). Without it, you're missing out on massive opportunities!

Common pitfalls when evaluating AI agents for the SOC

When evaluating AI agents for your SOC, it's not just about capabilities—it’s about control, oversight, and integration. In this clip, Philippe Tchakovski breaks down the most common mistakes security teams make when adopting AI: from fragile API integrations to missing guardrails and a lack of audit trails. Don’t deploy blindly—understand the risks before automation goes live.

Security isn't a department.

Security isn’t a department. It’s a shared responsibility. To move from reactive to preventive, every product team needs embedded cyber expertise. Ange Ferrari, SVP and CISO at Metro AG, explains how decentralizing security enables scale and forces organizations to treat security as everyone's job, not just IT's. If you want to "shift left" for real, this episode is your playbook.

All SSO security is not created equally

This blog has been adapted from a section of 1Password’s ebook: Why SSO is not enough for identity security. To read the complete ebook, click here. Single sign-on (SSO) solutions integrate with a company’s identity provider (IdP) to allow users to authenticate to multiple applications via a single log-in. By reducing the number of access points and employee credentials, SSO reduces a company’s attack surface.

What is a Web Browser Based Attack?

Did you know 95% of undetectable malware spreads through your browser? From Cross-Site Scripting (XSS) and CSRF to Clickjacking and drive-by downloads—web browser-based attacks are more common and more dangerous than ever. In this video, we break down how these attacks work, what causes them, and what you can do to stay protected—both as a user and a website owner.

API Gateway Security: The Essential InfoSec Guide

As the software world shifted toward microservices and distributed architectures, the volume and complexity of API traffic have skyrocketed. Unfortunately, so has the number of API-related breaches and cyber attacks. Last year, nearly 44% of all advanced bot traffic online targeted API endpoints, while traditional web applications received just 10% of the malicious traffic. It’s no surprise that 57% of organizations admit to having suffered API-related breaches in the past two years.