Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Cloudflare Handles Privacy Certifications (and Why Containers Matter to Developers)

In this episode, host João Tomé is joined by Emily Hancock, Chief Privacy Officer at Cloudflare, Rory Malone, Principal Privacy Compliance Specialist at Cloudflare.They discuss Cloudflare's new privacy certifications. At the end, there's also Confidence Okoghenun, Senior Systems Engineer at Cloudflare, sharing the innovative Cloudflare Containers for developers.

How agentic AI could transform enterprise workflows: Insights from MIT GenAI Lab

The line between human and machine is blurring—and it’s not a question of whether machines can do more, but how far we’re willing to let them go. The frontier lies in tackling the chaos and solving the fragmented processes that slow enterprises: siloed rulebooks, scattered pricing spreadsheets, and manual approvals.

Securing the Future of Generative AI: Why Security Can't Keep Pace with Innovation

By James Rees, MD, Razorthorn Security The artificial intelligence revolution isn’t coming. It’s here and it’s moving faster than anyone predicted. Children now trust ChatGPT more than their parents for information. AI-generated content is becoming indistinguishable from human work. Entire industries are being reshaped by technology that seemed like science fiction just a few years ago.

Automation and AI in Cybersecurity: $2.22 Million in Savings

Over 2024, the average global cost of a data breach reached $4.88 million. This is 10% up from the previous year and the highest amount to date. These figures, published in the Cost of Data Breach Report 2024, also reveal that companies implementing artificial intelligence and automation in their cybersecurity strategies saved an average of $2.22 million compared to businesses that did not adopt them.

The Hidden Cost of Field Service Inefficiencies: What You're Not Seeing on the Balance Sheet

Managing field operations is a lot like repairing a leaky pipe you see the water, but not always the source. As someone who has spent over a decade overseeing technicians, tools, and tasks across multiple sites, I've learned that the biggest budget drain often comes from things that don't show up on a line item: delays, miscommunication, and time spent chasing information. These inefficiencies rarely make headlines, but they're bleeding money from service organizations. Let's break down how.

EP 10 - A new identity crisis: governance in the AI age

In this episode of Security Matters, host David Puner sits down with Deepak Taneja, co-founder of Zilla Security and General Manager of Identity Governance at CyberArk, to explore why 2025 marks a pivotal moment for identity security. From the explosion of machine identities—now outnumbering human identities 80 to 1—to the convergence of IGA, PAM, and AI-driven automation, Deepak shares insights from his decades-long career at the forefront of identity innovation.

API Security Is a Business Problem-Not Just an IT One

APIs are more than technical components—they're business-critical assets. In this powerful moment, Jeremy Dodson lays out why frameworks aren't enough and why companies must treat API security as a core business priority. Security leaders: it’s time to shift your mindset and protect real data flows, not just check boxes.

How to Reduce IoT Risk with Policy-Based Identity Automation

Policy-based identity management transforms security administration from individual device and user management to comprehensive policy frameworks that automatically govern identity lifecycle, access controls, and security enforcement across entire IoT ecosystems. The key elements of policy-based identity management include defining user roles, managing user access, implementing identity governance, and leveraging role based access control to ensure appropriate access and compliance.

Trustwave SpiderLabs Goes Inside the AI Cyber Arms Race

While all manner of legitimate organizations are attempting to understand how to best and safely use artificial intelligence to improve productivity, the Trustwave SpiderLabs' Technology Deep Dive: AI Cyber Arms Race takes a forward-looking view at how adversaries are gaining experience and capability in their ability to turn AI against us.