Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Justin Searle brings 40+ year old industrial security systems into the 21st century [304]

Justin Searle, Director of ICS Security at InGuardians, joins us today to talk about the challenges facing industrial control system security. With increased attack surface areas and maintaining and updating decades-old systems, Justin's dedication to informing and educating newcomers and experts alike is more important now than ever before.

A complete IAM portfolio for Reti through its One Identity partnership

Join Lorenzo Beliusse, Reti Marketing Director, as he explores the partnership with One Identity and how the completeness of the One Identity portfolio makes it easy to recommend to Reti clients. Examine the One Identity solutions – for privileged access management (PAM), identity governance and administration (IGA), access management, and AD management – that have become such an important part of the Reti enterprise.

Why sensitive data sprawl is your biggest risk #netwrix #datasecurity

Sensitive data sprawl, accumulated access, and unclear ownership continue to increase risk across modern environments. Farrah Gamboa, Senior Director of Product Management at Netwrix, explains why continuous visibility into sensitive data and access is critical to reducing exposure and strengthening security.

Secure Enterprise AI Apps and Agents: Visibility, Governance, Runtime Protection

When you deploy an AI application, do you know what's being sent into it — or what's coming back out? Cato AI Security provides runtime protection for the AI applications your organization builds and deploys, with real-time enforcement, sensitive data anonymization, and a complete audit trail across every interaction.

Ep. 51 - 2026 Cyber War Update: Handala, MuddyWater, and the Rise of Destructive Attacks

Iranian cyber attacks are escalating—shifting from espionage to destructive, large-scale operations. In this episode, we break down what CISOs need to know. Host Tova Dvorin and offensive security expert Adrian Culley analyze the latest Iranian cyber threat activity, including groups like Handala (Void Manticore) and MuddyWater (Mango Sandstorm), and how their tactics are evolving.

Exposure Management - Tanium Tech Talks #157

Exposure management goes beyond CVEs. In this Tech Talk, see how Tanium helps you identify, prioritize, and remediate real risk across vulnerabilities, misconfigurations, compliance gaps, and more. You'll see how Tanium: Goes beyond CVEs to include misconfigurations, compliance failures, certificates, and lateral movement Uses benchmarks, dashboards, and risk scoring to prioritize what actually matters Connects discovery and remediation - from compliance policies to third‑party app patching.

Session on Most Dangerous Cybersecurity Attacks on Enterprises and How to Prevent Them, ETCISO 2026

In this talk at ETCISO SecuFest 2026, our Founder & CEO Mr. Anirban Mukherji discusses dangerous cyberattacks on enterprises and prevention strategies. AI has accelerated our development of IAM, MDM, and DLP solutions from months to weeks, unlocking cybersecurity opportunities. Key topics include the four AI security pillars (security from/for/of/using AI), the Replit database incident, AI agent vulnerabilities, defenses such as sandboxing and SSO/MFA, data privacy requirements beyond consent, and AI's influence on digital marketing and talent strategies.