Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Mythical 1+1=3 Model in Cybersecurity

The mythical 1+1=3 model in security? It happens when the tools you already own stop working in isolation — and start working as a system. Jay Wilson and Garrett Hamilton dig into why Reach’s platform approach matters: not just enhancing individual controls, but creating compounding value across identity, endpoint, email, and network. When visibility, configuration, and enforcement align, the outcome isn’t incremental — it’s exponential.

Technology Is Ready, Mindsets Need to Catch Up

Security technology for access control already exists, but success depends on mindset and the willingness to change course when conditions shift. The idea of being audible ready, switching plays at the line based on what appears in front of you, mirrors how security leaders adjust identity strategy and embrace change despite human resistance.

Principles in Practice 2: Authorization Should Be Deterministic, Not Probabilistic

Here’s the reality: AI unlocks incredible innovation, but it also introduces real security risk. LLMs are probabilistic, which makes them great for generating code or summarizing data, but unreliable when it comes to enforcing access. Security requires verifiable, rule-based truth. At 1Password, our approach to AI keeps authorization in a secure, auditable flow so you always know who is accessing what, and why.

Quick Start Guide for ggshield, the GitGuardian CLI

Get up and running with ggshield, the GitGuardian CLI, in just a few minutes by installing it, authenticating, and running your first secrets scan. This quick-start video shows you how to scan individual files and entire projects, then lock in protection with a pre-commit Git hook to keep secrets out of your commits.

Episode 3 - Network Visibility in the Cloud: Why Network Traffic Analysis Remains Critical

Richard Bejtlich discusses cloud security from a network-centric perspective with Corelight's cloud security researcher, David Burkett. They explore why monitoring network traffic remains essential in cloud environments, despite the presence of native security features offered by cloud providers. David highlights common threats such as container compromises, coin miners, and supply chain attacks, emphasizing the value of traffic visibility for detecting unusual behaviors and breaches.

Ep 1. Building DORA Ready Defenses

In this premiere episode of The Cyber Resilience Brief, we dive into the EU’s Digital Operational Resilience Act (DORA) — and why its impact goes far beyond Europe. Host Tova Dvorin is joined by Adrian Culley and David Murray from SafeBreach to break down what means for financial institutions, insurers, and ICT providers worldwide. The session covers: Listen now for actionable insights on evolving from incident response to instant anticipation, staying ahead of attackers, and meeting tomorrow’s regulatory demands today.

Veracode: Automating Application Risk Management with Veracode CEO Brian Roche

Hear from Veracode's CEO, Brian Roche, on how organizations worldwide face mounting security risks from AI and applications but struggle to identify where those risks reside. Veracode's Application Risk Management Platform solves this challenge by helping enterprises focus on their most critical applications—the ones that would irreparably impact business if compromised. Through automated AI-powered vulnerability detection and remediation, Veracode enables organizations to dramatically improve their compliance from 30% to 90% with just a few clicks.

Learn How Veracode Stops Attackers from Exploiting Vulnerabilities from Founder Chris Wysopal.

Hear from Veracode's Founder and Chief Evangelist, Chris Wysopal, on how attackers compromise organizations by scanning applications for vulnerabilities in code, APIs, mobile integrations, and cloud environments. Vulnerabilities enter systems through feature updates, open-source components, and third-party code—creating constant exposure.

Learn How Veracode Helps Developers Deliver Fast Without Compromising Security with SVP Sarah Law

Hear from Veracode's SVP of Business Operations, Sarah Law, on how developers face immense pressure to deliver software quickly while security and compliance teams struggle to keep pace with constant changes. The Veracode platform addresses this challenge by discovering and organizing all technology assets across systems, then assessing the risk associated with each one. What sets Veracode apart is its built-in governance and unified, configurable policy framework that adapts to each customer's unique security posture and regulatory requirements.