Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Protecting the Language of AI: Why API Security is No Longer Optional

Protecting the Language of AI: Why API Security is No Longer Optional As AI continues to reshape the digital landscape, APIs have become the "language" of innovation—but they've also become a massive target for attackers. In this clip from the A10 Networks webinar, "APIs are the Language of AI: Protecting Them is Critical," security experts Jamison Utter and Carlo Alpuerto discuss the complexities of modern API security.

Joomla SAML SSO with Okta | Step-by-Step SAML SP Setup Guide

Learn how to configure SAML Single Sign On (SSO) in Joomla using Okta as the Identity Provider. In this step-by-step tutorial, we show how to connect your Joomla site as a SAML Service Provider (SP) with Okta, allowing users to securely log in using their Okta credentials. What you will learn in this video: Creating and configuring a SAML application in Okta Setting up the Joomla SAML SP plugin Exchanging metadata between Joomla and Okta Configuring attribute mapping This configuration is ideal for organizations that want centralized user authentication, stronger security, and seamless access to Joomla using Okta-managed identities.

AI and Data Security: Why Your Data Security Model Is Hurting Innovation

Why Your Data Security Model Is Outdated For over 20 years, we’ve focused on the Data Envelope—securing the perimeter, the cloud, and the network. But in a world of AI and rapid data sharing, protecting the envelope is not enough. In this video, James Rice (VP of Product Marketing at Protegrity) explains why traditional security has become the biggest bottleneck for modern innovation. Whether you are a security leader, a data architect, or a business innovator, understanding this paradigm shift is essential for the next decade of growth.

Razorwire 2025 Cybersecurity Year in Review

The Razorwire Christmas Party 2025 episode looks back over a year of burnout, AI hype, flat security budgets and noisy breaches, and forward to the future of work in cybersecurity. Listeners get a fast survey of social engineering trends, alert fatigue, decision culture, talent pipelines and work life boundaries that shaped 2025 and point to the years ahead.

Bots vs. Barcodes: The Resource Quota Failure. #ticketmaster #bla #ratelimiting #businesslogic

The infamous Ticketmaster case highlights BLA 1: Resource Quota Violation. Attackers used bots for mass purchasing and employed ingenious evasion: they reverse-engineered the barcoding logic to rotate and authenticate tokens, bypassing security controls. The core failure? Flawed rate limiting and business logic expiration. You must protect your inventory and your purchasing flows as if they were financial assets.

A CISO's Honest Take on Regulation

Cybercriminals don't care about borders. So why do we have 12 different regulatory frameworks for the same threat? Olivier Busolini, Group Head of Information Security at Mashreq Bank, voiced the frustration every global CISO feels: "In every country, I have 12 countries at Mashreq. In every country, there is a slightly different or sometimes vastly different requirement that I have to abide to.".