Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Making cash management smarter with AI-powered insights from Balance - S2E11

In this episode, we're excited to introduce Batu Inal, Co-Founder and CTO of Balance, an intelligent treasury platform revolutionizing how enterprises optimize their cash management. Balance provides real-time visibility into cash across all accounts, AI-powered forecasting, and automated insights to help businesses work their money harder. With $50B+ in transactions processed and $2B+ in accounts monitored, the platform serves established organizations including large enterprise businesses.

Thinking in pipelines for AI agents with David Burkett

Join us for this session of Defender Fridays as we explore thinking in agent pipelines with David Burkett, Cloud Security Researcher at Corelight and Founder of Magonia Research. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Thinking long-term growth in an AI-dominated industry with Stel Valavanis of onShore Networks [302]

Today we're speaking with Stel Valavanis, Founder and Chairman at onShore Networks and Co-Founder at The Gallery Building, about sustaining a security company over three decades of industry changes. We also dive into investing in start ups and how founders can think long term about governance and growth.

Camille Stewart Gloster on how AI systems can help you wade through log data and get more done

AI and machine learning are already being used in cybersecurity to help reduce the "noise of all the indicators" that security teams receive. These systems can serve as a "first line of defense" by setting up potential response actions. However, organizations need to ensure they keep human analysts in the loop because contextual knowledge and human judgment remain critical. Data Security Decoded is available on our YouTube channel!

Emerging Threat: GNU Inetutils telnetd LINEMODE SLC Buffer Overflow (CVE-2026-32746)

CVE-2026-32746 is a critical out-of-bounds write in GNU Inetutils telnetd caused by insufficient bounds checking in the LINEMODE SLC (Set Local Characters) suboption handler. Public advisories attribute the issue to the add_slc logic not verifying whether the destination buffer is already full before writing additional data. The published CVSS v3.1 score is 9.8, with network attack vector, no required privileges, and no user interaction.

Why More AI Doesn't Guarantee Better Vulnerability Management Outcomes

AI is everywhere in vulnerability management right now. Technology vendors in all areas are adding new features and making bold claims about revolutionary capabilities. But here's the reality, especially for vulnerability and exposure management: more AI doesn't automatically mean less risk. The gap between AI's promise and its practical impact in enterprise vulnerability management is wider than most organizations realize.

What MSP Leaders Are Telling Us: Four Strategic Takeaways for the Channel

The CRN MSP 500 ecosystem, including the Elite 150, Pioneer 250, and Security 100, provides a clear picture of how managed service providers see their businesses evolving. When you read the responses from MSP leaders across the profiles and interviews, four themes emerge consistently: Together these themes describe a fundamental shift in the managed services industry, from IT support toward security-driven digital operations delivered at scale.

Goodbye audit chaos, hello Calm-pliance

Accelerating security solutions for small businesses‍ Tagore offers strategic services to small businesses. A partnership that can scale‍ Tagore prioritized finding a managed compliance partner with an established product, dedicated support team, and rapid release rate. Standing out from competitors‍ Tagore's partnership with Vanta enhances its strategic focus and deepens client value, creating differentiation in a competitive market. Map controls. Remediate gaps.

Secure Your Future with a Compliance-First AppSec Posture

If you treat compliance as a final hurdle before deployment, you are already behind. For years, organizations have viewed regulatory compliance as a box to check—a necessary evil that slows down development and frustrates engineering teams. The standard approach involves scrambling before an audit, manually aggregating data from spreadsheets, and patching vulnerabilities at the last possible minute.