Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Exabeam Security Intelligence Summit UKI 2025 | Partner Track Highlights

Partners from across the UKI region joined us in London for the Exabeam Security Intelligence Summit. This video captures highlights from our Partner Track, where we launched the new APEX Partner Program: built to drive profitability, accelerate enablement, and create the most partner-driven ecosystem in cybersecurity. Watch the recap of the event and see how we’re raising the bar – together. Subscribe for more product demos and cybersecurity insights!

The Key To Detecting AI Threats - CTRLtheThreat Cybersecurity Tips From Cato CTRL

The key to detecting AI threats? Detecting them before they detect you. Tune in to this week's series in which Dolev Attiya, threat researcher and member of Cato CTRL, shares insights about AI malware threats, agent to agent and top ways to stay protected. Subscribe: short.url/aBcXyZ Let’s connect: Instagram: short.url/aBcXyZ LinkedIn: short.url/aBcXyZ X (Twitter): short.url/aBcXyZ TikTok: short.url/aBcXyZ.

Overview of Teleport Zero Trust Access: Secure Infrastructure Without VPNs

In this video, we explore how Teleport Zero Trust Access replaces outdated VPNs and static credentials with a modern, identity-based approach to secure infrastructure access. See how Teleport unifies access across servers, Kubernetes, databases, and cloud environments, all powered by short-lived, certificate-based credentials that eliminate passwords, reduce risk, and streamline engineering workflows.

Best HIPAA Compliance Software by Category: Website Monitoring, GRC & Privacy

We see the same pattern across healthcare clients. The servers are locked down, databases encrypted, and GRC documentation is in order. Then we check the browser layer and find a Google Analytics pixel quietly sending appointment URLs and other PHI to third-party servers without a BAA.

Securing The Win Episode Two: Mark Hazelton

In this episode of Securing the Win, Oracle Red Bull Racing’s Chief Security Officer Mark Hazelton joins Calum Nicholas to reveal how the team protects its most valuable asset — data. From espionage scandals to modern cyber threats, Hazelton shares how F1’s fastest team stays secure in a digital world where every millisecond — and every password — counts.

Defending QUIC from acknowledgement-based DDoS attacks

On April 10th, 2025 12:10 UTC, a security researcher notified Cloudflare of two vulnerabilities (CVE-2025-4820 and CVE-2025-4821) related to QUIC packet acknowledgement (ACK) handling, through our Public Bug Bounty program. These were DDoS vulnerabilities in the quiche library, and Cloudflare services that use it. quiche is Cloudflare's open-source implementation of QUIC protocol, which is the transport protocol behind HTTP/3.

New data: Security's communication gap with leadership (cost vs. value)

Security leaders often face challenges that extend beyond the firewall: a major gap in communication between the security function and executive leadership. This misalignment can have severe consequences, including stalling deals, increasing organizational risk, and preventing security from being recognized as a key driver of business growth.