Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

JFrog AppTrust: A Technical Deep Dive into Building a Trusted Software Supply Chain

Software supply chains have grown more complex as software delivery accelerates across more teams, technologies and environments. While the pace of releases continues to increase, the ability to manage these releases has not accelerated correspondingly. Developers and development operations are now firmly in the spotlight, as new regulations demand clear, auditable proof that every stage of the software lifecycle, from coding to production is secure and compliant.

Netwrix AI - Accelerating Your Path to Data & Identity Security

Join us for Day 2 of the Netwrix Innovation Week Podcast Series, part of Cybersecurity Awareness Month. In this episode, Grady Summers and Jeff Warren discuss how Netwrix is building AI into the 1Secure Platform to help security teams gain faster insights, automate remediation, and stay in control. They also explore how we’re using AI responsibly to keep customer data private, protected, and within your control.

From Tool Sprawl to One Platform: How Graylog Simplifies Security Visibility

Security operations are buried under too many tools. Analysts switch between consoles, piece together context by hand, and burn valuable hours reconciling data that should already work together. According to Gartner, security leaders use an average of 19 different tools, and 80% say this level of complexity creates blind spots. This fragmentation slows down detection and response, drives up costs, and wears out teams that are already stretched thin.

How AI is Transforming Application Security Testing

AI is revolutionizing software development, enabling teams to build and ship faster than ever. But this speed introduces new risks at an unprecedented scale. Your current application security testing program must evolve to keep pace. For security leaders, the challenge is clear: how do you secure applications without slowing down innovation? This article provides a practical analysis of how artificial intelligence is fundamentally transforming application security testing (AppSec).

Azure Identity & Access Fundamentals | Sedara Cyber Bytes 2025

Learn how to strengthen your Microsoft cloud security in this recorded session of Sedara’s Cyber Bytes 2025 - Azure Identity & Access Fundamentals. In this workshop, Jason Taylor breaks down how identity and access management works in Microsoft Entra ID and Azure, explains the key differences between Entra and Azure roles, and shares best practices for securing your organization’s cloud identities.

From Noise to Action: Smarter Security Ops That Reduce Risk

In this episode of Logs & Lattes, host Palmer Wallace talks with Rich Murphy, Senior Product Manager at Graylog, about how smarter security operations help teams cut through the noise and focus on what truly reduces risk. From alert fatigue to risk-first response, they unpack practical ways to prioritize real threats, automate with context, and make incident response faster and more effective. Learn how modern SOCs are evolving beyond alert overload to focus on meaningful, risk-based action.

Logs & Lattes: Episode 2 - From Noise to Action: Smarter Security Ops That Reduce Risk

Security teams are overwhelmed by alerts, but which ones really matter? In this episode of Logs & Lattes, host Palmer Wallace talks with Rich Murphy, Senior Product Manager at Graylog, about how smarter security operations help teams cut through the noise and focus on what truly reduces risk. From alert fatigue to risk-first response, they unpack practical ways to prioritize real threats, automate with context, and make incident response faster and more effective. Learn how modern SOCs are evolving beyond alert overload to focus on meaningful, risk-based action.

1Password Presents: Securing the Win

Buckle up. We’re taking you inside a world where speed meets security We teamed up with Motorsport to bring the Oracle Red Bull Racing story to life in Securing the Win – the first-of-its-kind docuseries exploring how performance, precision, and security come together behind one of the world’s most advanced teams. Hosted by former F1 technician Calum Nicholas, the series takes you inside the high-pressure world of racing. Each episode uncovers lessons every security leader can relate to: trust under pressure, resilience through change, and speed without compromise.

Using Honeyfiles to detect adversaries and infostealers with Zane Gittins

Defender Fridays - Using Honeyfiles to Detect Adversaries with Zane Gittins Join us for this week's Defender Fridays as we explore using honeyfiles to detect adversaries and infostealers with Zane Gittins, IT Security Manager at Meissner Filtration Products. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Paul Hartmann AG optimizes identity management with One Identity

For the medical industry, clean directories, end-to-end security and streamlined workloads are key to ensuring quick, professional relationships with clients. And for a company that deals with medical products in areas such as wound care, hospitals, surgical centers and home care, data protection needs to cover both patients and their healthcare providers. For this, Germany-based Paul Hartmann AG turned to One Identity Manager for its smooth integration with every SAP system in their environment and optimized account creation with secure, efficient identity lifecycle management.