Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Simulation to Strategy: Evolving Your Red and Purple Teaming Approach

At a recent Sydney luncheon, Trustwave sat down with a room of senior security leaders to dig into the evolving role of red and purple team testing in a modern technical security assurance program. The discussion was led by Trustwave's Craig Searle, Director of Consulting & Professional Services in Pacific at Trustwave and TJ Acton, Director of SpiderLabs Testing, Pacific. More than 20 Sydney-area security professionals attended the event at Restaurant Huberts.

Is Your Code Safe? Hidden Risks & Security Measures | Mend.io #cybersecurity #softwaresecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Why AI governance is now a CISO imperative

Let’s be real: 2024 is the year AI went from pilot to policy. And in 2025, it’s not slowing down. Every enterprise I talk to, from high-growth SaaS companies to large-scale global platforms, implements AI internally or embeds it into its products. With that momentum comes a wave of questions: Is this secure? Are we exposing customer data? What will our auditors say? CISOs are now expected to balance innovation with protection, fostering progress while staying ahead of risk.

In cybersecurity, it's an arms race.

In cybersecurity, it's an arms race. Stephanie Cohen explained why financial services are prime targets and why strong partnerships are the real armor. Banks are one of the most attacked sectors on the planet. It's not just money at stake; it's entire economies. And here’s the kicker: You're only as strong as your weakest link. Ready to rethink your cybersecurity strategy? Dive into the latest episode of The Connectivity Cloud Podcast.

80s to AI - Career Talk - Tanium Tech Talks #127

A fire side chat from the heart with Ashley, reviewing 40 years in technology and career advice for uncertain times. What is the meta-narrative of a technology career? How can I differentiate myself in the tech career field? How can I differentiate myself among other job applicants? What is the next fun tech I could tackle? How do you keep a lifelong career fresh and fun? What are my options in a tech career?

Bridging ASPM and Vulnerability Management for Scalable Application Security

In this webinar, "Bridging ASPM and RBVM for Scalable AppSec," security leaders from Cycode and Nucleus explore how to unify application and infrastructure vulnerability management in complex, cloud-native environments.

The Evolution of Identity

From managing simple passwords to securing complex, cloud-native environments, how has identity management really changed? In this thought-provoking discussion, JumpCloud CEO Rajat Bhargava and CTO Greg Keller are joined by Rak Garg (Bain Capital Ventures), and Francis Odum (The Software Analyst) to challenge conventional thinking. They delve into the tension between usability and security, the risks of vendor lock-in, and the urgent need for identity solutions that can bridge the gap between legacy systems and the dynamic demands of cloud-native environments.

Top 5 Proactive Threat Intelligence Use Cases for Enhanced Cyber Defense

In this fast-moving world where businesses operate completely through IT infrastructure, waiting for a threat to happen and finding a solution isn’t enough. There should be a proactive approach, where you spot and remove a threat even before it touches your systems.

Cyber Deception as a Strategic Pillar in Active Defense

The cat-and-mouse game of cybersecurity never stops, and cyber deception in active defense gives defenders a powerful edge. Sun Tzu’s ancient wisdom “All warfare is based on deception” fits modern cyber defense strategies perfectly. Outsmarting adversaries has become just as crucial as blocking them.