Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Exabeam and Vectra AI Partner to Accelerate Threat Detection and Simplify Security Operations

New integration unifies Exabeam New-Scale Security Operations Platform with Vectra AI's cutting-edge network detection and response (NDR) to uncover threats that evade traditional tools.

How to Move Beyond Spreadsheets When Managing Vulnerabilities | Seemplicity

Still managing vulnerabilities with spreadsheets? In this short video, discover why traditional methods fall short and how automated Remediation Operations (RemOps) can help you move beyond manual tracking, endless update chasing, and version chaos. Learn how modern security teams: Whether you're dealing with a growing backlog or struggling to scale your vulnerability management, this video shows you a better, faster way forward.

Enter the SOC of the Future in Splunk's State of Security 2025

SOC leaders that aren’t thinking about the future are already behind — and what’s beyond 2025 is rapid evolution. The breakneck pace of AI innovation, a widening skills gap, and increasingly sophisticated threat tactics will encourage (one could even say force) SOC teams to embrace forward-leaning strategies to stay resilient.

Connected Car Security: Automotive IoT Threats and Protection

The automotive industry stands at a critical juncture where traditional mechanical systems converge with sophisticated digital technologies. Modern vehicles contain hundreds of electronic control units (ECUs), multiple communication networks, and constant connectivity to external systems. This transformation has created unprecedented opportunities for innovation while simultaneously introducing complex cybersecurity challenges that threaten both vehicle safety and driver privacy.

Fireside Chat with Cato's CEO: State of the SASE Market | SASEfy 2025

When a ransomware attack wiped out Häfele’s entire global network overnight, the stakes couldn’t have been higher. In just 4 weeks, Cato Networks rebuilt 180+ locations delivering resilience when it mattered most. As our CEO Shlomo Kramer shared at, “No other technology can deliver that.” Let’s connect.

Meet Egnyte Copilot: Unlock Efficiency With Secure Conversational AI

Egnyte's Copilot leverages conversational AI to drive productivity with secure AI grounded in your company's data. With Egnyte Copilot, AI is natively built into Egnyte, reducing security risks by ensuring accurate, relevant, and traceable data. This allows for quickly surfaced insights by summarizing dense files stored within Egnyte, highlighting key points, offering prompt suggestions, and transcribing audio and video files. With AI built into existing Egnyte workflows, team productivity, efficiency, and collaboration are increased.

Random but Memorable - Episode 14.9: Multiple Tectonic Brain Agents with Abe Ankumah

AI has taken us into uncharted territory. In this episode, we invite 1Password’s Chief Product Officer, Abe Ankumah, to share how the security industry can navigate this tectonic shift. Settle in as Abe explains some of the security challenges associated with agentic AI, and how 1Password is thinking about them. In Watchtower Weekly, we discuss government officials reusing weak passwords and the neurotech companies selling you brain data. Yikes.

IoT & PCI DSS : Addressing Security Risks

Over 50% of IoT devices have critical vulnerabilities hackers can exploit RIGHT NOW! 1 in 3 data breaches now involves an IoT device. If your IoT devices touch cardholder data, they're squarely in your PCI DSS scope – and a major security risk. Are you unknowingly exposing your payment systems to new cyber threats? We will have a glimpse at the critical intersection of IoT and PCI DSS, revealing how to secure your connected devices and protect sensitive cardholder data from evolving attacks.

What Is Scattered Spider? Inside the Rise of Identity-Based Attacks

If you’ve been following major cybersecurity incidents over the past couple of years, chances are you’ve come across the name Scattered Spider. From massive casino breaches to healthcare system outages, this threat actor has become a name that CISOs don’t take lightly. But what is Scattered Spider, really? And why is this group of cybercriminals getting so much attention? Scattered Spider is a financially motivated group that came into focus around 2022.