Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to build security policies that work for people-not just compliance

Strong security policies are the foundation of any successful security program. Before jumping into tools like Vanta to manage and automate your policies, it’s crucial to get the basics right—starting with how those policies are created, adopted, and aligned with compliance controls. ‍

The Trade Desk's Joe McCallister on salary negotiation and leading without micromanaging

In this week’s episode of The Future of Security Operations podcast, host Thomas Kinsella is joined by Joe McCallister. Joe’s journey in security is truly unique - in less than a decade, he pivoted from selling BMWs to his current role as Senior Manager of Cybersecurity Operations at The Trade Desk. He’s also led impactful initiatives in risk management, threat hunting, and incident response at Synoptek.

Medical Device Regulation (MDR): Why Cybersecurity And Fuzz Testing Are No Longer Optional

The MDR came into full effect in 2021, but many devices are still certified under MDD and will need to transition. As a result, Europe is facing a period of regulatory limbo. The MDR outlines what manufacturers must achieve but not how to do it, creating a gap between regulatory intent and practical implementation. To help bridge this gap, manufacturers rely on.

Avoiding Too Many Cooks in the Kitchen: Agentic AI Use Cases

AI agents work together to complete tasks. For instance, imagine a kitchen. In a home kitchen, we do everything ourselves, come up with the menu, get the ingredients, peel, chop, sauté, and plate — but in restaurants, everyone has different jobs. Agentic AI brings that restaurant-level skill to organize and optimize to you in your kitchen. In the case of cybersecurity, agents can provide the necessary backup for what you can’t get to in a day in the SOC.

APIs Get Discovered in 29 Seconds - Wallarm Honeypot Shocker #APIsecurity #Cybersecurity #Honeypot

Wallarm’s honeypot research revealed a startling fact: on average, it takes only 29 seconds for exposed APIs to be discovered in the wild. That means any misconfigured or undocumented API is a ticking time bomb. If you're not protecting your API surface, attackers will find their way in — fast. Learn why real-time API protection is no longer optional and how Wallarm helps stop threats before they breach your systems.

Nightfall Product Updates & News: April 2025

Managing endpoint security just got easier with Nightfall. Our latest updates enhance device management for endpoint security and expand data protection to give security and IT teams greater control with less overhead. Here’s the latest updates and features from Nightfall at a glance: Read more on how these updates help keep your security posture strong while minimizing distractions and unnecessary alerts.