Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Art of Stronger Passwords in the Age of AI

Passwords are the most common form of authentication, the classic “something you know.” They remain the most widely used method of securing accounts around the world. Research shows that about half of all applications still rely on passwords alone, and only about 12 percent of people use a unique password for every application. The problem is that humans can only remember five to seven passwords on average, yet most of us juggle seventy to one hundred online accounts.

Beyond Traditional AppSec: Navigating the New Frontier of AI Security with Mend AI

Hear from Bar-El Tayouri, Head of Mend AI, about the urgent need for a new approach to securing AI-driven applications. From understanding novel AI components and their risks to implementing a comprehensive AppSec program, this episode provides actionable insights for organizations building with AI.

Proven Best Practices for Safer Code that Work: AppSec for the Win | Webinar Mend.io

In this session, Chris Lindsey discusses proven best practices for building a robust AppSec program, offering actionable insights for both developers and security teams. Chris, with over 35 years of experience in software development and 15+ years in security, shares strategies that helped him run a successful security program.

Debunking Three Critical Security Myths

Being compliant doesn’t mean you’re secure. Achieving and maintaining CMMC compliance may demonstrate conformance and look good on paper, but it does not guarantee protection. Too often, government contractors check the boxes, pass the audit, and assume their job is done and they’re protected. Then a real-world attack happens—and the so-called “protections” fall apart. The defenses that met the standard weren’t built to stop real threats.

The Human Factor in Cybersecurity: How to Reduce Risk, Build Culture, and Strengthen Resilience

In today’s cybersecurity landscape, one thing remains constant: humans are both our greatest asset and our biggest risk. Despite increasingly sophisticated technology, human risk, insider threats, and social engineering attacks like phishing,continue to lead the charge when it comes to successful breaches.

CloudCasa and SUSE Storage: A Cost-Effective Disaster Recovery Solution for Kubernetes and SUSE Virtualization

CloudCasa by Catalogic and SUSE have partnered to deliver a new disaster recovery solution for Kubernetes and SUSE Virtualization environments. This joint approach combines CloudCasa’s Kubernetes-native backup and recovery platform with SUSE Storage (a.k.a. Longhorn) and its Disaster Recovery Volumes feature. This provides a resilient, storage-driven DR strategy that reduces cost, complexity, and recovery times.

Building the Strelka file scanning system with Josh Liburdi

Josh Liburdi, Principal Engineer of Security Operations at DoorDash, joined Defender Fridays to talk about building the Strelka file scanning system. Defender Fridays creates a collaborative space for security professionals to share ideas and experiences through informal, interactive conversations. All skill levels welcome - come learn alongside fellow defenders!

Top Security Threats Worldwide Q2 2025

WatchGuard CSO Corey Nachreiner and Director of Security Operations Marc Laliberte discuss key findings from the WatchGuard Threat Lab’s Q2 2025 Internet Security Report. They’ cover the latest malware and network attack trends targeting small and mid-sized enterprises and defensive tips you can take back to your organization to stay ahead of modern threat actor tactics.

What You Need to Know about the Comcast Data Breach

Comcast is a global powerhouse as one of the foremost telecommunications and media conglomerates. It was established in 1963 as a small cable operator in Mississippi. Comcast’s mission focuses on connection through broadband television and film. Besides being the largest home internet service in the United States, it owns large media platforms like NBC-Universal and Universal Pictures.

Privileged Session Management (PSM): How It Strengthens Data Security

A single negligent click, command, or keystroke by a privileged user can let cybercriminals enter your network. This is where privileged session management (PSM) comes in. PSM enables you to monitor high-risk sessions and detect suspicious activity in real time, preventing insider and external threats from going unnoticed. In this article, we explain why PSM is critical in cybersecurity and how it can protect your sensitive data from threats.