Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Exabeam Security Intelligence Summit UKI 2025 | Event Highlights & Key Takeaways

Relive the highlights from the Exabeam Security Intelligence Summit in London, where security leaders, users, and partners across the UK and Ireland gathered for a day of innovation and collaboration. From breakthrough AI advancements in SIEM and UEBA to inspiring customer success stories and hands-on breakout sessions, this event was more than just a conference, it was a community redefining the future of cybersecurity. Don’t miss the energy, insights, and connections that made this summit one to remember.

Exabeam Security Intelligence Summit UKI 2025 | Partner Track Highlights

Partners from across the UKI region joined us in London for the Exabeam Security Intelligence Summit. This video captures highlights from our Partner Track, where we launched the new APEX Partner Program: built to drive profitability, accelerate enablement, and create the most partner-driven ecosystem in cybersecurity. Watch the recap of the event and see how we’re raising the bar – together. Subscribe for more product demos and cybersecurity insights!

The Key To Detecting AI Threats - CTRLtheThreat Cybersecurity Tips From Cato CTRL

The key to detecting AI threats? Detecting them before they detect you. Tune in to this week's series in which Dolev Attiya, threat researcher and member of Cato CTRL, shares insights about AI malware threats, agent to agent and top ways to stay protected. Subscribe: short.url/aBcXyZ Let’s connect: Instagram: short.url/aBcXyZ LinkedIn: short.url/aBcXyZ X (Twitter): short.url/aBcXyZ TikTok: short.url/aBcXyZ.

Overview of Teleport Zero Trust Access: Secure Infrastructure Without VPNs

In this video, we explore how Teleport Zero Trust Access replaces outdated VPNs and static credentials with a modern, identity-based approach to secure infrastructure access. See how Teleport unifies access across servers, Kubernetes, databases, and cloud environments, all powered by short-lived, certificate-based credentials that eliminate passwords, reduce risk, and streamline engineering workflows.

Securing The Win Episode Two: Mark Hazelton

In this episode of Securing the Win, Oracle Red Bull Racing’s Chief Security Officer Mark Hazelton joins Calum Nicholas to reveal how the team protects its most valuable asset — data. From espionage scandals to modern cyber threats, Hazelton shares how F1’s fastest team stays secure in a digital world where every millisecond — and every password — counts.

How Cybercriminals are using AI - and How to Defend Against It

What happens when the dark side gets its hands on cutting-edge AI — and why might even seasoned defenders find themselves playing catch-up? Welcome back to Razorwire, where I’m joined by Oliver Rochford and Richard Cassidy to discuss how criminals are using AI, what’s actually working and how the threat landscape is changing. We explore how adversaries are using AI, what’s actually working in the wild and how professionals can prepare for the unsettling pace of change.