Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Microsoft Copilot: Balancing Power and Privacy Risks

Microsoft Copilot’s integration with MS Graph opens powerful doors, letting AI access emails, docs, and your entire MS365 data ecosystem. But with great convenience comes significant risk: your sensitive data could become more vulnerable to attacks. In this video, we explore the privacy and security concerns this integration introduces—and offer actionable insights on how you can mitigate these risks effectively.

EASM Buyer's Guide 2025: A guide for a futureproof EASM solution

Your external attack surface is growing — whether you’re aware of it or not. Cloud migration, IoT, AI, and remote work are all contributing to the rapid expansion of organizations’ external attack surfaces, and many security teams are struggling to keep up. According to a 2021 report, 69% of organizations admitted they had experienced at least one cyberattack that was initiated through exploiting an unknown or unmanaged internet-facing asset.

Exposing the Blind Spots: CrowdStrike Research on Feedback-Guided Fuzzing for Comprehensive LLM Testing

The increasing deployment of large language models (LLMs) in enterprise environments has created a pressing need for effective security testing methods. Traditional approaches, relying heavily on predefined templates, are limited in comparison to adaptive attacks — particularly those related to prompt injection attacks. This limitation becomes especially critical in high-performance computing environments where LLMs process thousands of requests per second.

Cybersecurity Innovation at LevelBlue | Rakesh Shah on What's Next

What does the future of managed security services look like? Rakesh Shah, VP of Product Management at LevelBlue, breaks down the roadmap ahead in this forward-looking video. Discover how LevelBlue is simplifying security offerings, modernizing service delivery, and introducing a clear “good-better-best” tiering model to give customers more choice and control.

Cybersecurity GTM Strategy in Action | Tawnya Lancaster, LevelBlue

How do you align cybersecurity services with what the market really needs? Tawnya Lancaster, Director of Product Marketing and Market Research at LevelBlue, shares how her team transforms global market insights into impactful go-to-market strategies. Learn about the rollout of flexible new service tiers across managed detection & response, vulnerability management, and network/cloud security.

Understanding Runtime Reachability 5th Episode

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

So your chatbot just insulted a customer? #cybersecurity #appsec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.