Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How GitGuardian and CyberArk MCP Servers Cut Secrets & Vault Sprawl with AI Automation

Watch the teams of GitGuardian and CyberArk for a demo-first session on how MCP (Model Context Protocol) servers can help you tame secrets sprawl and vault sprawl by letting developers use AI to trigger the right actions, with far less cognitive load! What you’ll learn.

How to Check Your iPhone for Viruses and Malware

Your iPhone is one of the most secure devices available, but no phone is completely immune to security threats. While Apple's strict security measures make traditional viruses rare, iPhones can still face risks from phishing attacks, malicious websites, compromised Wi-Fi networks, and suspicious apps. In this video, discover how to spot the warning signs that your iPhone might be infected, including: • Unfamiliar apps you didn't install • Unexpected spikes in data usage • Rapid battery drain • Slower performance than usual • Excessive pop-ups and fake system alerts.

CISOs - Eradicating Security questionnaires | TrustCloud

CISOs struggle with security questionnaires. Make security reviews the quickest part of closing a deal with TrustCloud. TrustCloud offers a Trust portal and AI to complete security questionnaires, rolled into one. Don’t let security reviews slow down sales (or take over your life). TrustShare’s secure, public-facing portal invites prospects to view compliance reports and complete security reviews on their own. If there’s a questionnaire, TrustShare pre-fills up to 85%, using information from prior questionnaires and artifacts in your security program.

CISOs - Transforming risk assessments | TrustCloud

CISOs struggle with risk assessment. Reduce risk and financial liability with TrustCloud. Take your risk register from manual spreadsheets to programmatic, predictive risk assessments. Monitor and forecast your risks in real time, enable IT risk quantification to prove financial impact to the board, and prevent risk instead of managing it.

CISOs - Transforming third-party risk assessments

CISOs struggle with third-party risk assessments. Automate third-party assessments and eliminate mundane tasks. Use AI and API driven automation to accelerate and simplify first-party, third-party, and nth-party risk assessments. Automate document analysis and receive contextual, reliable information. Run frequent, programmatic risk assessments on all your internal and third-party applications to eradicate the risk of one-time or point-in-time evaluations.

Lightboard Lab: Closing the Valley of Visibility in Network Vulnerability Assessment

Network Vulnerability Assessment is often treated as a point-in-time exercise—but real environments don’t stand still. Between long scan cycles, two things are constantly changing: network devices drift as configurations and versions evolve, and the world around them shifts as new vulnerabilities are disclosed.

Lightboard Lab: How Falcon Data Security Stops Data Theft

Data breaches often happen with valid access. Even authorized users and trusted devices can lead to data loss—from insider threats to credential-based attacks. See how Falcon Data Security detects and stops risky data movement in real time, even when activity looks normal. Subscribe and stay updated!

Lightboard Lab: What Modern Data Security Requires

Modern data security must go beyond data at rest. Sensitive data is constantly moving across endpoints, SaaS, cloud, and AI—creating risk that traditional DLP and DSPM tools can’t see. Learn how Falcon Data Security delivers real-time visibility into data in motion to detect and stop data loss before it becomes a breach. Subscribe and stay updated!