Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The right to privacy should also apply to your online activity-no exceptions

Most of us already know we’re being tracked every time we go online—cookies this, permissions that. You’re basically forced to accept some level of tracking just to use the internet. The good news? There’s been plenty of pushback against what many rightly see as weak privacy safeguards—both from governments and the public. But for all the progress we’ve made, we’re still only scratching the surface. True online privacy is a long way off.

Sustainable compliance made easy: Incorporating environmental responsibility into GRC strategies

As we speak about changing the regulatory and environmental landscape, organizations are shifting toward more responsible, sustainable practices not only to abide by regulations but also to build resilience, trust, and competitive advantage. Governance, risk, and compliance (GRC) strategies are evolving by incorporating environmental responsibility, ensuring that compliance is not merely a checkbox activity but a core part of an organization’s overall sustainability practices.

The Changing role of IAM Managed Services

In this short webinar clip, presented by David Cox, VP Identity Services at Xalient - Mike Shishman, VP of Alliances and Partners, Sean Harris, MSP Sales at SailPoint, discuss the changes we've seen in role managed services an play in helping organizations build, support, and mature their Identity Security programs. Topics include: How the MSP market has matured (it's not just ticketing) The things you should know (but they don't tell you) How to get the most out of a MSP Client examples (SailPoint MSP and beyond)

API Security: A Holistic View on Protecting Web Presences

In this video from Black Hat 2025, A10 Networks security expert Jamison Utter explains the importance of a unified, "one mind" approach to API security. He argues against the traditional, "stitched-together" method of using separate tools for different threats (e.g., API protection and a WAF). Instead, A10's real-time API protection solution looks at the holistic behavior of traffic and applies a single, intelligent security model to protect your web presence.

Uncover Hidden AD Group Risks & Privileged Access with Netwrix Auditor

Do you know who has actual privileged access in your Active Directory? In this webinar, see how Netwrix Auditor for Active Directory uncovers the real story behind administrative group membership, including nested permissions, effective access, and misaligned rights with built-in reporting and alerting.