Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Compliance vs ethics | TrustTalks - Ep 33 | Security and GRC Podcast

This podcast focuses on the crucial difference between compliance (adhering to laws and regulations) and ethics (upholding moral principles) in business. It highlights the risks of prioritising one over the other, advocating for a balanced approach to foster a strong ethical culture. Several case studies illustrate the consequences of neglecting either compliance or ethics. It also offers strategies for integrating both into business practices to enhance reputation, reduce risk, and improve decision-making.

Security Incident Report Template | TrustTalks - Ep 34 | Security and GRC Podcast

This podcast focuses on a downloadable security incident report template, explaining its importance, use, and value in maintaining organizational security. A security incident report is a document that outlines the details of any security incident that occurs within an organization. This report serves as an official record of the incident and is used for documentation, analysis, and future prevention.

Kenton Varda on Safe AI-Assisted Coding and the Power of Cloudflare Workers

In this episode, host João Tomé is joined by Kenton Varda, Principal Engineer at Cloudflare, for a wide-ranging conversation about AI, code, and the evolution of Internet development. Timestamps: Kenton shares how a real-world project shifted his view from AI skepticism to seeing the promise of AI-assisted coding, while emphasizing the need for strong human review, especially for security. The episode also goes into the architecture of Cloudflare Workers and its first months, Durable Objects, and the vision of the Internet as one programmable computer: “the network is the computer”.

4 Steps to Cyber Resilience | Expert Insights from LevelBlue | Dark Reading Interview

In this exclusive Dark Reading News Desk interview, Theresa Lanowitz from LevelBlue shares four practical and powerful steps organizations can take to boost their cyber resilience. From fostering a proactive cybersecurity culture to elevating cyber discussions to the boardroom, this conversation is packed with actionable insights. Learn how to secure your software supply chain, leverage AI for defense, and stay ahead of emerging threats.

Vulnerability Data in Next Gen-SIEM with Falcon Exposure Management

Vulnerability data is often siloed and captured in static dashboards, disconnected from real-time investigation. But with Falcon Exposure Management streaming into NG-SIEM, that changes. This demo shows how teams can correlate live vulnerability events with endpoint behavior, network activity, and even cloud telemetry. Using a Firefox example, we trace active and historical exposure, revealing how ExPRT.AI, asset metadata, and cloud-aware context come together in Next Gen SIEM.