Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Zero Trust Engine

The Zero Trust Engine is a foundational component of the Netskope One platform. It plays a pivotal role in gathering comprehensive risk telemetry and delivering unmatched contextual awareness to enable adaptive, least-privileged access to users, devices, applications, and data. This live demo showcases examples of how the Netskope Zero Trust engine provides full visibility and control.

AI: What's the future smell like? | AI Avenue Ep 6

In the season finale, Craig and Yorick take a big whiff of the future. What is our world going to look like? Which future do you want? The sit down with thought leaders from Cloudflare, @IBM, Science Fiction author, and a 9 year-old vibe coder/comedian named Fay. The future is bright if you want it to be.

Securing AI Applications in the Cloud: Shadow AI, RAG & Real Risks | Mend.io

What does it take to secure AI-based applications in the cloud? In this episode, host Ashish Rajan sits down with Bar-el Tayouri, Head of Mend AI at Mend.io, to dive deep into the evolving world of AI security. From uncovering the hidden dangers of shadow AI to understanding the layers of an AI Bill of Materials (AIBOM), Bar-el breaks down the complexities of securing AI-driven systems. Learn about the risks of malicious models, the importance of red teaming, and how to balance innovation with security in a dynamic AI landscape. What is an AIBOM and why it matters The stages of AI adoption.

Azure Identity & Access Fundamentals | Sedara Cyber Bytes 2025

Learn how to strengthen your Microsoft cloud security in this recorded session of Sedara’s Cyber Bytes 2025 - Azure Identity & Access Fundamentals. In this workshop, Jason Taylor breaks down how identity and access management works in Microsoft Entra ID and Azure, explains the key differences between Entra and Azure roles, and shares best practices for securing your organization’s cloud identities.

Improving the trustworthiness of Javascript on the Web

The web is the most powerful application platform in existence. As long as you have the right API, you can safely run anything you want in a browser. Well… anything but cryptography. It is as true today as it was in 2011 that Javascript cryptography is Considered Harmful. The main problem is code distribution. Consider an end-to-end-encrypted messaging web application.

Sweet Security Named Cloud Security Leader and CADR Leader in Latio Cloud Security Report

Sweet Security, a leader in Runtime Cloud and AI security solutions, today announced that it has been recognized as both a Cloud Security Leader and a Cloud Application Detection & Response (CADR) Leader in the 2025 Cloud Security Report by James Berthoty of 'Latio Tech.'

How Do Cloud Migration Consulting Services Help Businesses?

Organizations are modernizing their IT infrastructure. On-premises environments are no longer the preferred choice for them, as they are expensive and hard to manage. Because of this, organizations are moving to cloud-based environments for smoother business operations. But moving data, applications, and workloads from traditional platforms to the cloud is anything but easy. It requires careful assessment, technical precision, and risk management.

Security Visionaries | I Do Love To Be BSides the CSIDES (Interview with Samantha Swift)

Get an insider's look at community-driven cybersecurity events like BSides and CSIDES. In this episode of Security Visionaries, host Emily Wearmouth sits down with cybersecurity veteran and community organizer Samantha Swift (BSides organizer, DefCon volunteer) to unpack the power of community-driven security events. We dive deep into: If you are "cyber curious" or an industry veteran looking to connect, this episode is a must-listen!