Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How does Sisense stay on top of API Attacks?

Sisense powers analytics experiences inside the applications businesses rely on every day. As an API-first platform, securing those connections is critical, especially as AI agents increasingly operate through APIs to access data and trigger workflows. In this conversation, Sangram, CISO and VP of IT at Sisense, and Michael Callahan, CMO at Salt Security, discuss how Sisense approached API security strategically to protect their platform, maintain customer trust, and support innovation in the Agentic AI era.

Context Engineering Is Security Engineering. RSA 2026 Made the Case.

Cisco polled its major enterprise customers before RSA 2026 and found something astounding. 85% of large enterprises are experimenting with AI agents. Only 5% have moved them into production. That's not a technology gap. The models work. The tools exist. The 80-point spread between experimentation and production is a governance gap. It's also a context gap.

Identity and Access Management: The foundation of security

Organizations put in place firewalls, antivirus, intrusion detection and prevention systems, but the bad guys still get in and wreak havoc – often through the front door. Teams need to put strict controls and governance around all identities with access to resources to defend against insider threats.

How to Prevent Phishing Emails by Reducing Human Risk

Organizations have traditionally treated phishing emails as a technology problem to be solved with spam filters and secure email gateways. But with phishing attacks on the rise, these tactics are no longer enough. KnowBe4’s 2025 Phishing By Industry Benchmarking Report found a 47% increase in phishing attacks that bypass Microsoft’s native defenses and secure email gateways. Why do they succeed? Because they exploit reliable human behavior.

Can an Attack Start Without Malware? 82% of Attacks Do

What looks like a simple coding task can quickly turn into a real cyberattack. In this demo, we show how a modern malware-free attack works step by step. It starts with something that feels completely normal: a job interview and a small coding assignment. No suspicious files. No obvious malware. But once the script is executed, everything changes. You’ll see how adversaries use trusted tools like Git, Notepad, and Python to gain access, establish command and control, and move inside an environment without being detected at first.

OT Cyber Resilience: Strategic Data Protection for IEC 62443 and NIS2 Compliance

OT Data Protection & Resilience is the practice of securing industrial control system data, such as PLC logic, HMI configurations, and historian archives, against loss or cyberattack, while ensuring fast recovery to maintain safety and production continuity. In modern industrial environments, the traditional concept of"security as a barrier" is no longer sufficient.

Acronis Cyber Protect for OT: OT Resilience, Legacy Recovery & OEM Integrations

The first time I helped support a control server recovery at a packaging facility, someone asked "How long will this take?" We did not have a good answer. The backup existed. The process to restore it safely in a live production environment did not. We had carried IT assumptions into an OT problem, and it cost the plant an entire shift. IT/OT convergence created a gap that most backup vendors were not built to close. Production systems need continuous uptime.

Why now is the time to invest in operational technology resilience

As cyberattacks on industrial systems escalate and supply chains grow more complex, cyber resilience for operational technology (OT) isn’t optional — it’s a business imperative. But with budgets under pressure and resources stretched thin, many manufacturers are left pondering a difficult question: How can we strengthen OT defenses without incurring downtime or breaking the bank? Virtual conference OT resilience.