Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Building Security Programs That Actually Scale - with Bonnie Viteri | Secrets of AppSec Champions

Building great security programs takes more than checklists and best practices—it takes vision, collaboration, and adaptability. In this episode, Bonnie Viteri, Principal Technical Security Engineer at Yahoo, shares how to build scalable, resilient programs that evolve, survive leadership turnover, and actually provide value to the business.

Shadow APIs: The Blind Spot Putting Your Security at Risk #ShadowAPIs #APIDiscovery #devsecops

Shadow APIs those undocumented, forgotten, or hidden endpoints are one of today’s biggest cybersecurity risks. If you don’t know what APIs you have, you can’t protect them. Wallarm and Oracle experts explain why a complete and up-to-date API inventory is the foundation of modern security, and how missing even a single API can open the door for attackers.

Meeting the AI Mandates with Confidence: Why Federal Teams Trust Snyk

Federal agencies are moving fast to unlock AI's potential—from improving citizen services to driving mission outcomes. But with all that innovation comes a new wave of complexity and risk. Security, trust, and transparency can’t be afterthoughts. They need to be part of the build and AI adoption process from day one. AI-driven development is exponentially increasing both code speed and code insecurity, as AI generates code with up to 40% more vulnerabilities than human developers.

Gartner Recognizes Appknox in 2025 Hype Cycle-What It Means for AppSec

In a year defined by AI-driven transformation, Gartner’s 2025 Hype Cycle for Application Security couldn’t have come at a better time. The report outlines a seismic shift in how security leaders approach modern threats, and we are proud to share that Appknox has been recognized as a sample vendor in this year’s edition.

The Digital Asset Network Institutions Rely On. And It's Just the Beginning

If you’ve been in digital assets long enough, you’ve felt the shift—from experimentation to execution. Banks, custodians, exchanges, and fintechs have laid the groundwork for a new financial ecosystem; one that can support the scale, compliance, and interoperability demands of global finance. But that isn’t just about where assets are stored. If you’re still treating custody as an endpoint rather than a gateway, that’s a problem.

Evolving Your DSPM Program: A Data-First Imperative

DSPM has become essential in today’s complex security landscape. This piece explores how organizations are evolving beyond basic deployment, the trends reshaping DSPM, and how Netwrix helps deliver continuous, actionable data security at scale. Data Security Posture Management (DSPM) has rapidly matured into a critical component of modern cybersecurity.

How Legacy Manufacturing Systems Make a Hacker's Job Easy

As we see in the Trustwave SpiderLabs 2025 Manufacturing 2.0 Threat Report, the manufacturing sector is facing a rapidly increasing number of cyber threats with ransomware and phishing attacks being the attacker's primary weapon. The focus on this sector has resulted in the cost of a data breach in manufacturing jumping nearly $1 million to $5.6 million in 2024 compared to the previous year.

Episode 24: Guardians of access: PAM, AI, and the future of cybersecurity ft. Ramanathan K

In this episode of Server Room, we dive into the fast-evolving world of Privileged Access Management (PAM) with Ramanathan K, Head of the PAM Suite at ManageEngine. From humble beginnings as a password vault to becoming a core pillar of identity security, PAM has come a long way. We unpack the growing role of AI, the rise of non-human identities, zero standing privileges, and how real-world breaches are being tackled—especially in regions like the Middle East and Africa. Whether you're a security professional or just PAM-curious, this episode is packed with insights you won’t want to miss.

Credential Stuffing and ATO: 16 Billion Reasons Brands Are at Risk

Account takeover (ATO) is one of the most consistent and costly threats facing consumer-facing businesses in 2025. And this year, the problem has been supercharged by the Mother of All Breaches (MOAB), a credential leak containing 16 billion username and password combinations. It rarely begins with a breach of your own systems. More often, it starts with someone else’s data leak. Credentials are reused, recompiled, and redeployed across platforms you may not even realise are vulnerable.