Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Using Honeyfiles to detect adversaries and infostealers with Zane Gittins

Defender Fridays - Using Honeyfiles to Detect Adversaries with Zane Gittins Join us for this week's Defender Fridays as we explore using honeyfiles to detect adversaries and infostealers with Zane Gittins, IT Security Manager at Meissner Filtration Products. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Paul Hartmann AG optimizes identity management with One Identity

For the medical industry, clean directories, end-to-end security and streamlined workloads are key to ensuring quick, professional relationships with clients. And for a company that deals with medical products in areas such as wound care, hospitals, surgical centers and home care, data protection needs to cover both patients and their healthcare providers. For this, Germany-based Paul Hartmann AG turned to One Identity Manager for its smooth integration with every SAP system in their environment and optimized account creation with secure, efficient identity lifecycle management.

Automation Anywhere + Protecto: How Leaders Secure GenAI Data

GenAI data security is now a critical concern for every enterprise. In this insightful episode of AI On The Edge, Dinesh Chandrasekhar, Founder and Chief Analyst at Stratola, sits down with Amar Kanagaraj (CEO, Protecto.ai) and Steve Shah (SVP Products, Automation Anywhere) to explore the future of data privacy, agentic automation, and securing LLMs in enterprise settings. Learn how two of the industry's top innovators are setting AI guardrails, preventing sensitive data leaks, and embedding privacy-by-design into large-scale automation.

Securing AI Applications in the Cloud: Shadow AI, RAG & Real Risks | Mend.io

What does it take to secure AI-based applications in the cloud? In this episode, host Ashish Rajan sits down with Bar-el Tayouri, Head of Mend AI at Mend.io, to dive deep into the evolving world of AI security. From uncovering the hidden dangers of shadow AI to understanding the layers of an AI Bill of Materials (AIBOM), Bar-el breaks down the complexities of securing AI-driven systems. Learn about the risks of malicious models, the importance of red teaming, and how to balance innovation with security in a dynamic AI landscape. What is an AIBOM and why it matters The stages of AI adoption.

Why Security Can Be Stricter: A Zero Trust Approach to AppSec with AI | Mend.io

Is AI making application security easier or harder? We spoke to Amit Chita, Field CTO at Mend.io, the rise of AI agents in the Software Development Lifecycle (SDLC) presents a unique opportunity for security teams to be stricter than ever before. As developers increasingly use AI agents and integrate LLMs into applications, the attack surface is evolving in ways traditional security can't handle. The only way forward is a Zero Trust approach to your own AI models. Join Ashish Rajan and Amit Chita as they discuss the new threats introduced by AI and how to build a resilient security program for this new era.

Beyond Penetration Testing: 10 Cyber Resilience Exercises to Strengthen Your Security Posture

Modern cybersecurity can no longer rely solely on penetration testing. While pen tests remain vital for spotting technical vulnerabilities, they capture only a moment in time. True cyber resilience requires organizations to test how well their people, processes, and technology perform under real-world pressure. At Foresiet, we’ve seen that resilience comes from continuous practice — from crisis simulations to recovery rehearsals — not just from patching systems.

Why Cybersecurity Training for Students Is Essential in Today's Digital World

In a hyperconnected era where everything from classes to finances happens online, students face increasing exposure to cyber risks. From identity theft to ransomware attacks, digital threats are evolving faster than ever. That’s why cybersecurity training for students is no longer optional — it’s essential. Much like learning financial literacy or time management, understanding digital safety is a life skill that protects not just your data, but your future.

Capita Breach Fallout: £14 Million Fine Highlights the True Cost of Cyber Negligence

In one of the UK’s most significant cybersecurity incidents of 2023, Capita, a major outsourcing and professional services provider, was fined £14 million by the Information Commissioner’s Office (ICO). The penalty came after a massive data breach compromised the personal information of 6.6 million individuals, revealing systemic gaps in access control, threat detection, and incident response.