Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

XDR meets AIOps for Faster AI-Driven Detection and Resolution

Discover how Cato Networks helps you respond to security and networking issues quickly, easily and efficiently, in one place, with the AI power of Cato XOps. Watch this demo to see how XOps brings together XDR and AIOps to cut through huge volumes of events and alerts and provide one place to see what’s important, to investigate issues, and to mitigate threats quickly - across networking and security.

Decipher Me. What Hack Can You Detect?

What do people love more than secrets? Deciphering them. Join Etay Maor, founding member of Cato CTRL and chief security strategist at Cato, as he exposes the hidden mechanics behind AI prompt injections. From the secret codes of espionage to the subtle tricks of modern cybercriminals, this session connects the dots between history’s ciphers and today’s AI vulnerabilities. Because every secret has a pattern—if you know where to look.

Ep. 7 - You've Just Run a Penetration Test, What's Next Beyond Pen Testing

In this episode, you'll learn: What happens after a traditional penetration test? In this episode, host Tova Dvorin is joined by Adrian Culley, Senior Sales Engineer and EU lead at SafeBreach, to explore the critical evolution from legacy pentesting to continuous, automated red teaming (CART) and breach and attack simulation (BAS).

The Changing role of IAM Managed Services

In this short webinar clip, presented by David Cox, VP Identity Services at Xalient - Mike Shishman, VP of Alliances and Partners, Sean Harris, MSP Sales at SailPoint, discuss the changes we've seen in role managed services an play in helping organizations build, support, and mature their Identity Security programs. Topics include: How the MSP market has matured (it's not just ticketing) The things you should know (but they don't tell you) How to get the most out of a MSP Client examples (SailPoint MSP and beyond)

API Security: A Holistic View on Protecting Web Presences

In this video from Black Hat 2025, A10 Networks security expert Jamison Utter explains the importance of a unified, "one mind" approach to API security. He argues against the traditional, "stitched-together" method of using separate tools for different threats (e.g., API protection and a WAF). Instead, A10's real-time API protection solution looks at the holistic behavior of traffic and applies a single, intelligent security model to protect your web presence.

Uncover Hidden AD Group Risks & Privileged Access with Netwrix Auditor

Do you know who has actual privileged access in your Active Directory? In this webinar, see how Netwrix Auditor for Active Directory uncovers the real story behind administrative group membership, including nested permissions, effective access, and misaligned rights with built-in reporting and alerting.