Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing Aikido AI Cloud Search

Gain instant visibility into your cloud environment with Aikido Cloud Search. Search your cloud like a database. Whether you want to identify exposed databases, vulnerable virtual machines, or over-permissive IAM roles — Aikido gives you the power to uncover risk in seconds. No query language required, no waiting on devops. Just describe what you’re looking for, like “Give me all VMs with CVE-2025-32433 that have port 22 open.” Scroll down to "How It Works" to get technical.

How To Reduce Your Attack Surface with Secure Password Management

With the rise of remote work, cloud computing and mobile devices, your organization’s attack surface is larger than ever. Watch this short video to learn what an attack surface is, how to identify security vulnerabilities and five ways to minimize your attack surface.

Is Windsurf's SWE-1 Model a Game Changer? Let's See...

In this episode of my ongoing series testing AI coding tools, I put Windsurf’s latest model, SWE-1, to the test. The challenge? Build a secure note-taking app from scratch. I’m looking at everything from how it handles authentication and encryption to whether the code is clean, usable, and actually secure. If you're curious about how SWE-1 stacks up against other AI dev tools like GPT-4 or Claude, this video is for you.

Staying Ahead of Evolving Cyber Threats: What Security Teams Need to Know

Dan Bradbury, Chief Product Officer at UpGuard, kicks off our 20th Summit with a look at how far we’ve come—and where we’re headed. From AI-powered risk assessments to expanded threat intelligence, discover what’s new, what’s next, and how your feedback continues to shape our roadmap.

From Compliance to Cyber Resilience: Leadership Lessons from the Frontline

In this fireside chat, Randy Vickers, Deputy CISO at the National Student Clearinghouse, shares hard-earned lessons on securing sensitive data at scale, navigating vendor risk, and leading high-impact security programs—especially when budgets are tight and threats are evolving fast.