Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Adopt DORA's Threat-Led Penetration Testing Requirements

The new Digital Operational Resilience Act (DORA) requires significant financial entities in the EU to carry out Threat-Led Penetration Testing (TLPTs) on a regular basis. However, the skills required along with the planning for these types of exercises can prove difficult and time consuming. During this session, Kroll brings together our red teaming, threat intelligence and DORA regulatory compliance experts to provide practical guidance on how security, risk and resiliency leaders can adopt a sustainable threat-led penetration testing (TLPT) program as required by DORA.

Teleport to Protect AI and Grant AI Access

How teams are securing AI systems and providing protected access to sensitive resources. Learn about self-hosted AI solutions, database integrations with full audit capabilities, and centralized MCP server deployment. Discover how Teleport enables secure AI integration with your infrastructure while maintaining comprehensive visibility and control. Perfect for teams looking to balance innovation with security compliance.

APIs: The Invisible Backbone of Digital Transformation

APIs: The Invisible Backbone of Digital Transformation In today's app-driven economy, APIs (Application Programming Interfaces) have become the foundation for innovation and connectivity. A10's security experts Carlo Alpuerto and Jamison Utter explore the explosive growth in API development and adoption across industries. These powerful interfaces now power everything from financial services and retail experiences to transportation systems, IoT devices, autonomous vehicles, and smart city infrastructure.

#213 - Building cybersecurity products with Jonathan Haas, Product at Vanta

On this episode of the Cybersecurity Defenders Podcast we speak with Jonathan Haas, Product at Vanta, about building cybersecurity products. Jonathan’s work focuses on making security compliance faster and more accessible, helping teams move from months-long processes to efficient workflows that take just days. Before Vanta, he was the co-founder and CEO of cybersecurity startup ThreatKey, and before that he held key roles at Snapchat, DoorDash, and Carta, where he built and refined compliance systems during times of rapid growth.

Brivo Access: How To Create a Schedule Exception

In Brivo Access, a schedule automates access control, eliminating the need for manual unlocking or locking of doors at specific times. A schedule exception temporarily changes the access permissions defined by the regular schedule. Exceptions are usually applied to specific dates or date ranges, such as holidays, special events, or temporary closures. Explore the future of security and smart technology with Brivo. Our content delves into innovative solutions that empower businesses and individuals to create safer, more connected environments.

SolarWinds Hack: How State Actors Infiltrated & What You Can Learn #cybersecurity #solarwinds

State actors played the long game by targeting SolarWinds’ build server, injecting malicious code without detection. Learn why code diffs, hash checks, and decompiling builds are critical for cybersecurity today.