Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Hidden Cost of Field Service Inefficiencies: What You're Not Seeing on the Balance Sheet

Managing field operations is a lot like repairing a leaky pipe you see the water, but not always the source. As someone who has spent over a decade overseeing technicians, tools, and tasks across multiple sites, I've learned that the biggest budget drain often comes from things that don't show up on a line item: delays, miscommunication, and time spent chasing information. These inefficiencies rarely make headlines, but they're bleeding money from service organizations. Let's break down how.

EP 10 - A new identity crisis: governance in the AI age

In this episode of Security Matters, host David Puner sits down with Deepak Taneja, co-founder of Zilla Security and General Manager of Identity Governance at CyberArk, to explore why 2025 marks a pivotal moment for identity security. From the explosion of machine identities—now outnumbering human identities 80 to 1—to the convergence of IGA, PAM, and AI-driven automation, Deepak shares insights from his decades-long career at the forefront of identity innovation.

API Security Is a Business Problem-Not Just an IT One

APIs are more than technical components—they're business-critical assets. In this powerful moment, Jeremy Dodson lays out why frameworks aren't enough and why companies must treat API security as a core business priority. Security leaders: it’s time to shift your mindset and protect real data flows, not just check boxes.

How to Reduce IoT Risk with Policy-Based Identity Automation

Policy-based identity management transforms security administration from individual device and user management to comprehensive policy frameworks that automatically govern identity lifecycle, access controls, and security enforcement across entire IoT ecosystems. The key elements of policy-based identity management include defining user roles, managing user access, implementing identity governance, and leveraging role based access control to ensure appropriate access and compliance.

Trustwave SpiderLabs Goes Inside the AI Cyber Arms Race

While all manner of legitimate organizations are attempting to understand how to best and safely use artificial intelligence to improve productivity, the Trustwave SpiderLabs' Technology Deep Dive: AI Cyber Arms Race takes a forward-looking view at how adversaries are gaining experience and capability in their ability to turn AI against us.

Smarter API Security Demo: See How Wallarm Protects Modern APIs and Agentic AI

Modern APIs are under constant attack—from botnets to logic abuse to threats targeting Agentic AI. Most security tools lag behind. Wallarm doesn’t. Join us for a live walkthrough of Wallarm’s advanced API security platform. In this session you will see how to instantly discover vulnerable endpoints, protect business-critical flows, and stop API abuse—without slowing down your teams. What you'll learn.

EP 10 - A new identity crisis: governance in the AI age

In this episode of Security Matters, host David Puner sits down with Deepak Taneja, co-founder of Zilla Security and General Manager of Identity Governance at CyberArk, to explore why 2025 marks a pivotal moment for identity security. From the explosion of machine identities—now outnumbering human identities 80 to 1—to the convergence of IGA, PAM, and AI-driven automation, Deepak shares insights from his decades-long career at the forefront of identity innovation. Listeners will learn.

Beyond Traditional Threats: The Rise of AI-Driven API Vulnerabilities

AI has had dramatic impacts on almost every facet of every industry. API security is no exception. Up until recently, defending APIs meant guarding against well-understood threats. But as AI proliferates, automated adversaries, AI-crafted exploits, and business logic abuse have complicated matters. It’s no longer enough to merely patch known flaws; security teams must now contend with intelligent, adaptive attacks that evolve as fast as the technology they target.

Cloud Security's Unspoken Truth

Every DevSecOps, cloud security and even AppSec team knows the feeling: scanners flag hundreds – sometimes thousands – of critical issues across your pipelines, environments and apps. But how many of those findings actually matter? How many represent real, immediate risk to applications running in production? The uncomfortable answer? Very few. At ARMO, we’ve seen firsthand how over 60% of security findings are irrelevant hypothetical risks that will never be exploited.

Securing AI code at the source: Mend.io now integrates with Cursor AI Code Editor

AI is reshaping software development quickly. From boilerplate generation to test automation and refactoring, LLMs like the one behind Cursor are transforming how developers build. But with great power comes a new generation of vulnerabilities. At Mend.io, we’re excited to announce a native integration with Cursor, the IDE taking the dev world by storm.