Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Keeper Webinar - From Passwords to Privileged Access: How KeeperPAM Secures It All

Watch the recording of our exclusive webinar featuring Craig Lurey, CTO & Co-founder of Keeper Security. Discover how KeeperPAM is revolutionizing privileged access management by seeing a walkthrough of the newest KeeperPAM and Endpoint Privilege Manager features in this live demo showcasing its functionality.

The Surprising Benefits of AuditFusion360 for Your Business

Every year, businesses worldwide spend millions of dollars and countless hours on compliance audits — PCI DSS, GDPR, HIPAA, SOC 2, ISO 27001, DORA, SOX, CCPA… the list keeps growing. But here’s the problem: most organizations run these audits separately. That means: Multiple auditors Repeated testing Overlapping documentation Skyrocketing costs In fact, studies show that companies waste up to 40% of their compliance budgets on duplicated audit work. That’s not just expensive — it’s inefficient.

BlueVoyant Adopts a New Naming Convention to Bring Clarity to Cyber Threat Analysis

The lack of a universal standard for naming threat actors often creates confusion in the cybersecurity community. The same threat actor can be identified by multiple aliases depending on the vendor or team tracking it. For example, a Russian government-sponsored cyber threat group is referred to alternatively as “APT29”, “Cozy Bear”, “Midnight Blizzard” and “Nobelium”.

CyberArk Privilege Cloud Version 14.7 Release

CyberArk Privilege Cloud version 14.7 improves user experience and operational efficiencies in the CyberArk Identity Security Platform. This release introduces significant updates and improvements, including Secure Access space and the new Identity Protection space, which features Threat Detection and Response (TDR), Risk Management, and more.

Ephemeral accounts don't leave an audit trail, and that's a problem

Ephemeral accounts are temporary, high-privilege accounts created for short-term use. They’re a convenient way to get quick, temporary access to systems, data or applications for one-off tasks. Need temporary admin rights for a few minutes? Just create an ephemeral account, complete your task and move on. But behind the convenience of these temporary credentials loom serious security threats.

Is SailPoint's NERM the Right Tool for Managing your Non-Employee Identities?

In this video, Dave Cox, VP of Identity Services and Ryan Cluff, Director, IGA Practice at Xalient, dive into how organizations are using SailPoint's Non-Employee Resource Management (NERM) module to better manage contractors and vendors. We also explore how managed services in the identity space are evolving, especially with platforms like SailPoint.

AI Is Writing the Code - Can Security Keep Up? | How to Secure Agentic IDEs from Dev to CI/CD | Mend

AI coding agents are exploding in use—but are they quietly shipping exploitable code? In this webinar, we break down real data, real incidents, and a practical blueprint for securing AI-accelerated development.

AI Meets SAST - Reimagining the Future of Static Analysis | Webinar Mend.io

Join host Tony Morbin as he explores how AI is revolutionizing Static Application Security Testing (SAST) in this future-forward episode with Saoirse Hinksmon, Senior Product Marketing Manager at Mend.io, and Amir Shahmir, Senior Sales Engineer at Mend.io. This isn’t your average security webinar — it’s a deep dive into the convergence of AI and SAST, uncovering how GenAI is making static analysis faster, smarter, and more actionable for developers and AppSec teams alike.