Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

2025: Zenity's Journey to Securing the Most Transformative IT Wave of Our Time

2024 was a year unlike any other—a year of transformation, resilience, and immense progress. Despite the challenges our team faced, including the impact of the war in Israel, we stood strong, united by our mission to secure AI Agents everywhere, and focusing on providing impactful value to our customers and partners. Together, we laid the foundation for the next wave of innovation, enabling enterprises to embrace this revolutionary technology with confidence and security.

Sergey Tokarev: Businesses Lessons Transformed into AI Lessons

AI implementation can enhance business processes and help manage different tasks to save time and effort. AI has become a part of everyday life; yet many people have not learned to use it properly to benefit from it. Sergey Tokarev, the co-founder and partner at Roosh Ventures, commented on business errors and shared valuable solutions to advance AI for business.

Exploring the Ethical Side of Immediate Edge in Trading

The world of trading has undergone a significant transformation with the advent of automated trading platforms like Immediate Edge, where Immediate's AI trading bot promises users the ability to trade cryptocurrencies and other assets with minimal effort. These platforms are leveraging sophisticated algorithms to maximize profits. However, as with any technological advancement, the ethical implications of using such platforms, particularly Immediate Edge, warrant careful consideration. This exploration delves into the ethical dimensions of Immediate Edge, examining its impact on traders, markets, and society at large.

Ransomware Attacks on CRMs: Why They're Growing and How to Stop Them

Keeping data and operations streamlined is why CRM systems are an essential part of business. However, as they are used more and more, they have become a prime target of ransomware attacks that can threaten the availability of sensitive customer data, as well as business operations.

How Ping Identity Automated Security & Cut Scanning Time from Weeks to Minutes with Mend.io

Join Bruno Lavit, Risk Manager at Ping Identity, as he shares how they transformed their application security process using Mend IO. Learn how Ping Identity went from time-consuming manual security scans to fully automated CI/CD pipeline integration, reducing scanning time from weeks to minutes. Ping Identity improved their security posture while accelerating software development. Perfect for AppSec managers, CSOs, and risk managers looking to enhance their security automation.

Regulatory Readiness & Resilience with Kris Lovejoy, Global Security Leader at Kyndryl

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.

Foundation of Modern Cyber Defense: Building Resilient Security Frameworks | IdentityShield Summit

Lokesh Singh Rajawat, Senior Software Engineer at miniOrange, delivers an engaging session on establishing foundational cybersecurity practices. Gain insights into crafting resilient security frameworks that serve as the cornerstone of modern cyber defense strategies, protecting against evolving threats in today’s digital landscape.

#187 - Automation in MSSP Operations with David Burkett, Cloud Security Researcher at Corelight

On this episode of The Cybersecurity Defenders Podcast we talk about automation in MSSP operations with David Burkett, Cloud Security Researcher at Core light. David has deep expertise in cloud threat detection and automation. Over the course of his career, David has built and optimized three different Cyber Security Operations Centers for MSSP and MDR providers, demonstrating his unparalleled skill in scaling security operations through automation and efficient processes.