Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New v11.1: Expanded Proxmox Support, Real-Time Replication, Disaster Recovery and MSP Direct Connect

Backup admins can't predict the future—but with the right strategy, they don't need to! Join us for an exclusive live stream as we unveil new backup and anti-ransomware capabilities that can protect your data against evolving threats. Watch a live demo of Granular Backup for Physical Machines, Expanded Backup Capabilities for Proxmox VE, Improved Real-Time Replication, MSP Direct Connect and other exciting features in NAKIVO’s v11.1 release!

Verifiable AI: Policy Management for Next-Gen AI Security

As AI agents increasingly automate complex B2B workflows, how do organizations ensure security and compliance? In this segment, A10 Networks' security experts, Jamison Utter, Diptanshu Purwar, and Madhav Aggarwal, dive into the critical steps for securing AI deployments. Diptanshu emphasizes the importance of integrating AI agents into existing governance platforms, leveraging systems such as role-based access control and policy management.

Is This the Best Coding Model in the World? Claude Sonnet 4.5

In this episode of our AI Coding Tools series, we test Claude Sonnet 4.5 to see if it can build a secure note-taking app. The model claims to be the best in the world — but does it live up to the hype? We’ll cover how it codes, where it shines (or struggles), and how it stacks up against other AI coding assistants.

How ZenBusiness Protects Data Across SaaS While Scaling Safely | Nightfall AI Case Study

ZenBusiness has empowered over 850,000 business owners to launch and grow their businesses. And they’re doing it without letting data protection slow them down. With Nightfall AI’s automation-first DLP, ZenBusiness secures critical enterprise apps, resolves issues efficiently, and keeps their focus on delivering value to business owners. Chris Chipman, Enterprise IT Architect at ZenBusiness, calls Nightfall “that extra IT staff member” that runs 24/7, protecting data wherever it goes.

Reimagining Trust in Software Releases: A New Approach to Supply Chain Integrity (Part 1)

Only secure, verified, compliant software should reach production. Full stop. With increasing pressure on modern development teams to deliver across security and compliance requirements, a fully-secured, attestable pipeline demands complete visibility and control across the entire release lifecycle in a single solution.

Reimagining Trust in Software Releases: A New Approach to Supply Chain Integrity (Part 2)

Only secure, verified, compliant software should reach production. Full stop. With increasing pressure on modern development teams to deliver across security and compliance requirements, a fully-secured, attestable pipeline demands complete visibility and control across the entire release lifecycle in a single solution.

An AI/ML Deep Dive with Luke Wolcott

This week on the podcast, we bring on WatchGuard's head of MDR data science Luke Wolcott to discuss the evolution of machine learning and artificial intelligence in cybersecurity. We dive into the differences in common (and uncommon) machine learning models, the pros and cons of supervised vs unsupervised learning, and why some of the coolest things happening in AI aren't the ones you hear about in the news.