Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Fall 2025 Product Launch Teaser

Cyberhaven is excited to introduce Data Security Posture Management, now in Early Access. Existing DSPMs helped security teams inventory sensitive data across cloud repositories, but they stop short of delivering meaningful protection. They identify what data organizations have and where it resides, but not who owns it, where it came from, or how it’s being used. As data moves through modern organizations, copied between applications, repos, and endpoints, summarized into AI tools, and shared externally, those systems lose visibility and therefore their ability to protect data.

Non-Human Takeover: Cybersecurity Strategies from CyberArk & Xalient Experts

CyberArk & Xalient's top thought leaders provide insights & strategies for tackling the non-human takeover. The rise of non-human identities is reshaping cybersecurity. Join Mike Rohlfs and David (DJ) Morimanno as they share actionable strategies to protect your enterprise. Key Takeaways: Why non-human identities are the next big security challenge Proven strategies for identity threat detection and response Remediation techniques Making your business secure Free tools.

Securing The Win Episode Three: Nimesh Kotecha

From the track to the factory, every second counts. Thousands of devices. Streams of real-time data. No room for delays or doubt. In Episode 3 of Securing the Win, Oracle Red Bull Racing’s Nimesh Kotecha Group Head of End User Services at Oracle Red Bull Racing shows how 1Password helps deliver trusted access without friction, keeping their team fast, focused, and secure, even under pressure. Watch now.

November 03, 2025 Cyber Threat Intelligence Briefing

A critical remote code execution vulnerability in the Windows Server Update Services (WSUS) server role tracked as CVE 2025 59287 (CVSS: 9.8) addressed in the October patch cycle is under active exploitation. Researchers at RandoriSec produced a report on the current state of Microsoft Teams Access Token theft, a tactic that has been used by many threat actor groups to move laterally within environments and assist in internal phishing attacks.

Keeper 101 - Enterprise: Keeper Endpoint Privilege Manager

Keeper’s Endpoint Privilege Manager is an advanced Privileged Elevation and Delegation Management solution that eliminates standing admin rights and provides just-in-time elevated access across your Windows, macOS, and Linux endpoints. This video will provide a simple walkthrough of the setup, deployment and utilization of Keeper Endpoint to significantly reduce the threat of ransomware, insider threats and data breaches – all without sacrificing productivity or performance.

The AI buzzword trap in compliance tools | Heard in the founder chat ft. Inflo's Tom Skelton

“AI-powered.” “AI-native.” “End-to-end AI.” At some point, it all sounds the same—but it’s not. In this “Heard in the Founder Group Chat” episode, Tom Skelton, Information Security and Technology Lead at Inflo, shares how to spot real AI that saves time (and risk)—and how to avoid platforms that just rebrand old features.

The Business of API Security: Unpacking the Q3 API ThreatStats Report

Q3 provided us with another opportunity to dig into API vulnerabilities, exploits, and breaches. We'll dive into the details, picking out the trends that impact how you defend your APIs. This quarter's report includes a special focus on business logic abuse. Join the webinar to learn.