Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is an Enterprise Risk Retainer?

Organizations today are under pressure to effectively respond to acute risk events that can threaten financial stability, regulatory compliance, executive safety and stakeholder trust. Hear from Managing Director Nickolas Savage on the importance of getting the right support quickly, while maintaining cost efficiency and operational resilience.

EP 15 - Why banks need to treat machine identities like VIPs

In this episode of Security Matters, host David Puner speaks with Andy Parsons, CyberArk’s Director of EMEA Financial Services and Insurance, whose career spans from the British Army to CISO and CTO roles in global financial institutions. Andy shares hard-earned lessons on leadership, risk management, and the evolving cybersecurity landscape in banking—from insider threats to machine identity governance and the rise of agentic AI.

The Invisible Trick: How to Fool an AI Agent

The Invisible Trick: How to Fool an AI Agent A10 Networks' security experts, Jamison Utter, Madhav Aggarwal, and Diptanshu Purwar, discuss a classic example of an adversarial attack that tricks an AI agent using the equivalent of invisible watermarks. Madhav explains how researchers used an invisible watermark in a research paper that, when scanned by an AI agent, would automatically trigger a positive review. This watermark was not visible to human reviewers. This clever manipulation highlights a significant vulnerability in AI models: they can be influenced by hidden data in their input.

Beyond the Perimeter: A CISO's Guide to Modern Security Architecture

In this episode of Make Work Happen, JumpCloud's CISO Bob Phan sits down with Superbet CISO Alex "Jay" Balan to challenge traditional cybersecurity thinking. They discuss Jay's "internet-first" security philosophy, which advocates for a strategic shift away from outdated on-premise practices and private networks. Learn why assuming compromise, practicing "resilience through violence," and establishing a single source of truth for identity are the keys to building a more secure and efficient organization.