Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Can ChatGPT Decode Exploit Data? You'll Be Surprised!

Can ChatGPT really make sense of exploit data? The answer is yes. In this clip, security expert Brian Johnson shows how ChatGPT decoded a hex-encoded payload and revealed the contents of a password file in seconds. Watch the full webinar to see how AI tools like ChatGPT are changing the penetration testing game.

JumpCloud vs. Kandji: Is Your IT Platform Built for a Diverse World?

Don’t settle for an Apple-only approach when your IT environment is diverse. This video reveals the critical difference between a single-focus point solution like Kandji and a unified platform that brings together identity, access, and device management. Learn why a holistic solution is essential for true UEM, controlling the entire user lifecycle, and ensuring a single secure identity for every resource in your multi-platform business.

10 Critical Capabilities of API Detection and Response

Web Application and API Protection (WAAP) solutions have become increasingly vital in today’s cybersecurity strategies, providing essential defenses against attacks targeting web applications and APIs. It’s no surprise that APIs are growing in popularity, with 80% of companies reporting that more than half of their applications depend on APIs—a figure projected to reach 88% within the next 24 months (ESG Research, 2025).

The New Frontier: Why You Can't Secure AI Without Securing APIs

The release of a new KuppingerCole Leadership Compass is always a significant event for the cybersecurity industry, offering a vendor-neutral view of the market's current state. The 2025 edition, focusing on API Security and Management, is critical as it arrives at a pivotal moment for technology. It clearly presents a fact many organizations are just beginning to understand: the crucial connection between the rise of Artificial Intelligence and the necessity for robust API security.

Responsible AI for improved security and better decision making

One Identity helps organizations strengthen cybersecurity, boost efficiency and control costs through the One Identity Fabric, a holistic approach to identity and access management (IAM). By unifying IAM tools, including identity governance and administration (IGA), access management (AM), privileged access management (PAM), and Active Directory management (AD Mgmt), it ensures optimal functionality and efficiency. This cohesive structure reduces identity sprawl and extends governance to the farthest endpoints of your IAM ecosystem.

Prioritize with Snyk's Open Source Vulnerability Experience

Prioritizing which vulnerabilities to fix across your application isn't always easy. Is it exploitable? Is it reachable? Will the update introduce breaking changes? Are there any other teams using this library that you should be aware of? What does the backlog look like if other changes need to be made? And that's just this week. Next week, it'll be the same thing all over again, with new discoveries, new version releases, and maybe even a new cybersecurity breach.

Securing KMM Apps: Root/Jailbreak Detection & SSL Pinning Explained

In the first blog of the KMM series, we introduced Kotlin Multiplatform Mobile (KMM) and its cross-platform advantages. In this part, we go deeper into mobile security in KMM apps, focusing on: But, before that, let’s quickly recap what KMM is. Kotlin Multiplatform Mobile (KMM) enables developers to write shared code for both Android and iOS, while still maintaining platform-specific implementations where necessary. For the sake of simplicity, we have divided this blog into two sections.

Executive Cloud Posture Reports with Charlotte AI: Demo Drill Down

Powered by AI, Falcon Cloud Security surfaces the most critical misconfigurations, and Charlotte AI transforms them into clear business impact to provide CISO ready reports. Subscribe and Stay Updated: ► Don't miss out on more exciting content! Subscribe to our channel for the latest updates, case studies, and more from the world of cybersecurity. Hit the bell icon to receive notifications whenever we post new videos.

Runtime Security vs. Static Security in the Cloud

Cloud security is often divided into two: Runtime Security and Static Security. While both are crucial to protecting cloud environments, they differ significantly in their objectives, methodologies, and effectiveness against different types of threats. Understanding these differences helps organizations build a robust security strategy by leveraging the strengths of both.