Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Meet the Founders of Protecto: Securing Data for Agentic AI

In this video, we introduce the visionary founders behind Protecto — a company on a mission to make AI safe and compliant for the enterprise era. Amar Kanagaraj, Founder & CEO A second-time entrepreneur, Amar previously led a startup to a successful exit. He began his career as a developer at Sun Microsystems, then went on to lead product management for Microsoft Search & AI. With an MBA from Carnegie Mellon and an MS in Computer Science from LSU, Amar brings a powerful blend of business and technical insight to Protecto.

Building the Anthropic Team: Daniela Amodei on Hiring 10x AI Engineers | Frameworks for Growth

In this episode of Frameworks for Growth, Vanta CEO Christina Cacioppo sits down with Daniela Amodei, President and Co-founder of Anthropic, to discuss what it takes to build both a mission-driven company and a cutting-edge AI research lab. They explore how Daniela approaches hiring with intention, how to scale responsibly in the age of AI, and what it means to build trust while working on transformative technologies like Claude.

Cyber Resilience 2025 with Theresa Lanowitz | LevelBlue Futures Report

What does cyber resilience look like in 2025? Join Theresa Lanowitz, Chief Evangelist at LevelBlue, as she unpacks the findings of the 2025 LevelBlue Futures Report: Cyber Resilience and Business Impact. In this exclusive video, Theresa shares expert insights into the evolving threat landscape, the rise of AI-readiness, software supply chain visibility, and the five key traits of a cyber resilient organization.

Veracode: Application Risk Management for today's AI-driven world

Discover Veracode, the comprehensive application risk management platform designed for today's AI-driven world. This video provides an overview of how Veracode empowers organizations to build and deploy secure software by offering unified visibility, AI-driven prioritization, and integrated tools for detecting and remediating vulnerabilities. Learn about Veracode's key capabilities, including static analysis (SAST), dynamic analysis (DAST), software composition analysis (SCA), and risk management.

What Our Ransomware Simulation Taught Us #cybersecurity #ransomware

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

How to Create a Monitored Device in Brivo Access CP

In this video, we'll show you how to configure a Monitored Device in Brivo Access. Monitored Devices are openings that need monitoring without full access control (think emergency exits, secure cabinets, or equipment room doors). Explore the future of security and smart technology with Brivo. Our content delves into innovative solutions that empower businesses and individuals to create safer, more connected environments.