Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How AI is Transforming Application Security Testing

AI is revolutionizing software development, enabling teams to build and ship faster than ever. But this speed introduces new risks at an unprecedented scale. Your current application security testing program must evolve to keep pace. For security leaders, the challenge is clear: how do you secure applications without slowing down innovation? This article provides a practical analysis of how artificial intelligence is fundamentally transforming application security testing (AppSec).

Azure Identity & Access Fundamentals | Sedara Cyber Bytes 2025

Learn how to strengthen your Microsoft cloud security in this recorded session of Sedara’s Cyber Bytes 2025 - Azure Identity & Access Fundamentals. In this workshop, Jason Taylor breaks down how identity and access management works in Microsoft Entra ID and Azure, explains the key differences between Entra and Azure roles, and shares best practices for securing your organization’s cloud identities.

From Noise to Action: Smarter Security Ops That Reduce Risk

In this episode of Logs & Lattes, host Palmer Wallace talks with Rich Murphy, Senior Product Manager at Graylog, about how smarter security operations help teams cut through the noise and focus on what truly reduces risk. From alert fatigue to risk-first response, they unpack practical ways to prioritize real threats, automate with context, and make incident response faster and more effective. Learn how modern SOCs are evolving beyond alert overload to focus on meaningful, risk-based action.

Logs & Lattes: Episode 2 - From Noise to Action: Smarter Security Ops That Reduce Risk

Security teams are overwhelmed by alerts, but which ones really matter? In this episode of Logs & Lattes, host Palmer Wallace talks with Rich Murphy, Senior Product Manager at Graylog, about how smarter security operations help teams cut through the noise and focus on what truly reduces risk. From alert fatigue to risk-first response, they unpack practical ways to prioritize real threats, automate with context, and make incident response faster and more effective. Learn how modern SOCs are evolving beyond alert overload to focus on meaningful, risk-based action.

1Password Presents: Securing the Win

Buckle up. We’re taking you inside a world where speed meets security We teamed up with Motorsport to bring the Oracle Red Bull Racing story to life in Securing the Win – the first-of-its-kind docuseries exploring how performance, precision, and security come together behind one of the world’s most advanced teams. Hosted by former F1 technician Calum Nicholas, the series takes you inside the high-pressure world of racing. Each episode uncovers lessons every security leader can relate to: trust under pressure, resilience through change, and speed without compromise.

Using Honeyfiles to detect adversaries and infostealers with Zane Gittins

Defender Fridays - Using Honeyfiles to Detect Adversaries with Zane Gittins Join us for this week's Defender Fridays as we explore using honeyfiles to detect adversaries and infostealers with Zane Gittins, IT Security Manager at Meissner Filtration Products. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Paul Hartmann AG optimizes identity management with One Identity

For the medical industry, clean directories, end-to-end security and streamlined workloads are key to ensuring quick, professional relationships with clients. And for a company that deals with medical products in areas such as wound care, hospitals, surgical centers and home care, data protection needs to cover both patients and their healthcare providers. For this, Germany-based Paul Hartmann AG turned to One Identity Manager for its smooth integration with every SAP system in their environment and optimized account creation with secure, efficient identity lifecycle management.

Automation Anywhere + Protecto: How Leaders Secure GenAI Data

GenAI data security is now a critical concern for every enterprise. In this insightful episode of AI On The Edge, Dinesh Chandrasekhar, Founder and Chief Analyst at Stratola, sits down with Amar Kanagaraj (CEO, Protecto.ai) and Steve Shah (SVP Products, Automation Anywhere) to explore the future of data privacy, agentic automation, and securing LLMs in enterprise settings. Learn how two of the industry's top innovators are setting AI guardrails, preventing sensitive data leaks, and embedding privacy-by-design into large-scale automation.

Securing AI Applications in the Cloud: Shadow AI, RAG & Real Risks | Mend.io

What does it take to secure AI-based applications in the cloud? In this episode, host Ashish Rajan sits down with Bar-el Tayouri, Head of Mend AI at Mend.io, to dive deep into the evolving world of AI security. From uncovering the hidden dangers of shadow AI to understanding the layers of an AI Bill of Materials (AIBOM), Bar-el breaks down the complexities of securing AI-driven systems. Learn about the risks of malicious models, the importance of red teaming, and how to balance innovation with security in a dynamic AI landscape. What is an AIBOM and why it matters The stages of AI adoption.