Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Tanium gives certainty to U.K. institutions of higher learning

Hear from IT leaders from some of the United Kingdom's top universities on the challenges they face and how they support their institution's mission of higher learning with help from Tanium. Featured interviews: Dennis Knight, End User Computing Manager, Canterbury Christ Church University Alex Goffe, Director of Campus Technology Services, University of Manchester Karan Singh, Head of Cybersecurity, University of Arts London Chris Howarth, Technical Information Security Manager, University of Salford PJ Hemmaway, CIO, University of Manchester.

Wallarm's Top API Threats: What You Need to Know #InjectionAttacks #AttackVectors #APIHacks

API threats are evolving fast—but are security standards keeping up? While OWASP updates API security guidelines yearly, real-world threats like injections remain a top attack vector. Learn why Wallarm’s research reveals a different API security reality and what organizations must do to stay protected.

Protect your users from Internet risks

The Internet is now part of your corporate network, however browsing the web comes with hidden risks—malware, phishing attacks, and malicious websites. In this video, we’ll explore how Cloudflare’s Secure Web Gateway (SWG) helps keep users safe by filtering and inspecting Internet traffic in real time. Whether you're protecting a remote workforce or securing an entire organization, Cloudflare’s solution ensures that users can access the web securely—without sacrificing speed or productivity.

How To Detect Indicators Of Compromise In Your Business

Don’t wait until your data is compromised—be proactive. Listen, most cyberattacks don’t start with an obvious warning. There’s no flashing red alert, no system shutdown—just subtle anomalies that seem harmless at first. But those small details? They’re Indicators of Compromise—signs that an attacker may already be inside your network.

1:1 Cybersecurity Chat with Amelia Gowa at CISO Sydney 2024 | Filmed by AZK Media

Filmed at CISO Sydney 2024 by AZK Media, this exclusive conversation with Amelia Gowa, Trustwave’s NSW State Director, explores the key cybersecurity challenges facing organizations today. In this interview, Amelia shares her insights on: The evolving threat landscape in 2025 How AI, IoT, and cloud are reshaping cybersecurity risks The impact of third-party dependencies and shadow IT Why a proactive, intelligence-led security strategy is essential.

AIDA - Fighting AI with AI

AIDA (Artificial Intelligence Defense Agents) is an AI-native suite of agents that supercharges your approach to human risk management. It leverages multiple AI technologies to create personalized, adaptive, and highly effective training for all of your users that actually changes behavior. By automating template generation, training, and reporting, AIDA reduces the administrative burden on your security teams so they can focus on protecting your network.