Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Semantic Guardrails for AI/ML - Protegrity AI Developer Edition

In this installment of our AI Developer Edition Set-up series, Dan Johnson, a software engineer at Protegrity, introduces semantic guardrails. Learn how to protect your LLM and chatbot workflows from malicious prompts and insecure AI responses. As AI becomes central to enterprise operations, controlling the context of conversations is a major challenge. Semantic guardrails provide a safety layer that ensures your AI stays on topic and never leaks sensitive PII.

First 72 Hours of a Cyber Incident: How GRC & Security Teams Must Respond Together

When a critical vulnerability is exploited, the first 72 hours of a cyber incident can determine the outcome. In this scenario-driven webinar, Bitsight experts break down how security, GRC, and threat intelligence teams must work together—fast—to detect risk, prioritize action, and communicate clearly under pressure.

Cyber Risk in 2026: Top Threats, AI Risks & What Security Leaders Must Do Next

Cyber risk is evolving fast—and 2026 will demand more from security leaders than ever before. In this forward-looking webinar, Bitsight Co-Founder Stephen Boyer and SVP Vanessa Jankowski break down the biggest cyber threats shaping the year ahead, from AI-driven attacks and expanding attack surfaces to third-party and cloud risk.

KnowBe4 Urges Action: Take Control of Your Data this Data Privacy Week

With organizations collecting and storing massive amounts of personal data these days, much of which people share freely, we need to become better at protecting data on both the storing and sharing side of things. Organizations must have strong data protection measures in place and everyone should start being more digitally mindful when sharing their own personal data. Ultimately, being careful of what we put out there is the best way to reduce cyberattacks and data breaches.

Why Organizations Need Both IGA and PAM

As organizations develop modern Identity and Access Management (IAM) strategies to defend against advanced cyber threats, it’s essential to implement both Identity Governance and Administration (IGA) and Privileged Access Management (PAM) as part of a defense-in-depth approach. PAM provides granular control and monitoring of privileged accounts at runtime, while IGA ensures appropriate access is approved, governed and reviewed throughout the identity lifecycle.

Security Priorities and Expectations: A Board Level Overview

Compliance. Reporting. Risk visibility. These are no longer checkbox exercises in the boardroom. Today’s boards expect more than confirmation that regulations are being met. With evolving threats and AI-driven risk, they want regular, structured visibility into vulnerabilities, before gaps turn into incidents.

Nightfall DLP 2026: Corporate v. Personal Session Differentiation | Live Demo

See the future of data loss prevention in action. This live demo showcases Nightfall's breakthrough session differentiation technology that intelligently blocks sensitive file uploads to personal cloud accounts while seamlessly allowing them in corporate environments.

Ep 27: 2026 Security operations insights

On this episode of Masters of Data, we dive into our 2026 Intelligent Security Operations report. While 90% of 500+ security leaders see AI/ML cutting alert fatigue, actual implementation remains stuck at basic anomaly detection—not the full automation everyone wants. The gap is real: only 51% say their SIEM effectively reduces detection and response times, exposing serious maturity issues. Add rampant tool sprawl (most orgs run 3-10+ security tools that don't communicate), and you've got an integration nightmare. We explore how Model Control Protocol and AI agents could solve this, but here's the truth.