Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Trade Desk's Joe McCallister on salary negotiation and leading without micromanaging

In this week’s episode of The Future of Security Operations podcast, host Thomas Kinsella is joined by Joe McCallister. Joe’s journey in security is truly unique - in less than a decade, he pivoted from selling BMWs to his current role as Senior Manager of Cybersecurity Operations at The Trade Desk. He’s also led impactful initiatives in risk management, threat hunting, and incident response at Synoptek.

Medical Device Regulation (MDR): Why Cybersecurity And Fuzz Testing Are No Longer Optional

The MDR came into full effect in 2021, but many devices are still certified under MDD and will need to transition. As a result, Europe is facing a period of regulatory limbo. The MDR outlines what manufacturers must achieve but not how to do it, creating a gap between regulatory intent and practical implementation. To help bridge this gap, manufacturers rely on.

Avoiding Too Many Cooks in the Kitchen: Agentic AI Use Cases

AI agents work together to complete tasks. For instance, imagine a kitchen. In a home kitchen, we do everything ourselves, come up with the menu, get the ingredients, peel, chop, sauté, and plate — but in restaurants, everyone has different jobs. Agentic AI brings that restaurant-level skill to organize and optimize to you in your kitchen. In the case of cybersecurity, agents can provide the necessary backup for what you can’t get to in a day in the SOC.

APIs Get Discovered in 29 Seconds - Wallarm Honeypot Shocker #APIsecurity #Cybersecurity #Honeypot

Wallarm’s honeypot research revealed a startling fact: on average, it takes only 29 seconds for exposed APIs to be discovered in the wild. That means any misconfigured or undocumented API is a ticking time bomb. If you're not protecting your API surface, attackers will find their way in — fast. Learn why real-time API protection is no longer optional and how Wallarm helps stop threats before they breach your systems.

Nightfall Product Updates & News: April 2025

Managing endpoint security just got easier with Nightfall. Our latest updates enhance device management for endpoint security and expand data protection to give security and IT teams greater control with less overhead. Here’s the latest updates and features from Nightfall at a glance: Read more on how these updates help keep your security posture strong while minimizing distractions and unnecessary alerts.

Measure what matters: 5 benchmarks every security leader should track

Are you looking to validate if your cloud services are resilient and adequately secured? Consider the following five cloud security benchmarks to assess your organization’s cloud deployments. CISOs know that their security programs should be data-driven and that metrics are integral to communicating the status of security capabilities to organizational stakeholders, including the executive leadership team and the board of directors.

7 Cloud Storage Safety Concerns and How To Prevent Them

While it is the cloud storage service's responsibility to secure your data, security concerns are still a concern for many users. Security issues or challenges can happen for several reasons, which can be prevented, but can also occur due to insider threats or a lack of employee cybersecurity knowledge.