Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyber Resilience 2025 with Theresa Lanowitz | LevelBlue Futures Report

What does cyber resilience look like in 2025? Join Theresa Lanowitz, Chief Evangelist at LevelBlue, as she unpacks the findings of the 2025 LevelBlue Futures Report: Cyber Resilience and Business Impact. In this exclusive video, Theresa shares expert insights into the evolving threat landscape, the rise of AI-readiness, software supply chain visibility, and the five key traits of a cyber resilient organization.

Veracode: Application Risk Management for today's AI-driven world

Discover Veracode, the comprehensive application risk management platform designed for today's AI-driven world. This video provides an overview of how Veracode empowers organizations to build and deploy secure software by offering unified visibility, AI-driven prioritization, and integrated tools for detecting and remediating vulnerabilities. Learn about Veracode's key capabilities, including static analysis (SAST), dynamic analysis (DAST), software composition analysis (SCA), and risk management.

Shadow AI: Examples, Risks, and 8 Ways to Mitigate Them

Shadow AI refers to the unauthorized or unmanaged use of AI tools, models, frameworks, APIs or platforms within an organization, operating outside established governance frameworks. While employees may adopt these AI tools with good intentions, seeking to enhance productivity or solve problems more efficiently, the lack of oversight creates significant security, compliance, and operational risks.

What Our Ransomware Simulation Taught Us #cybersecurity #ransomware

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

How to Create a Monitored Device in Brivo Access CP

In this video, we'll show you how to configure a Monitored Device in Brivo Access. Monitored Devices are openings that need monitoring without full access control (think emergency exits, secure cabinets, or equipment room doors). Explore the future of security and smart technology with Brivo. Our content delves into innovative solutions that empower businesses and individuals to create safer, more connected environments.

Checkups and Checklists: Cyber Risk Isn't Just a Technical Problem

There are many things in our lives we must prepare for to be ready. For other things, we wing it, or we're not prepared to deal with it at the moment. For me, I've reached that point in my life where I needed to have a medical procedure done, and it was something I've put off for several years. It may not be very comfortable to admit, but last week, I had a colonoscopy. That's not exactly how you'd expect a cybersecurity blog to start, but hear me out on this one!

What Is AI?

What is AI really? Throughout this article, I will remove the hype and get to the most honest answer ever. Artificial Intelligence, or AI, or at least the first version of how we think of it today, was “invented” in the 1950s…a long time ago. Since then, various computer scientists and groups have worked on different iterations, often using different names, including machine learning and neural networks.

theNET's Trending Stories: Security for an AI-powered, quantum-enhanced era

Tech leaders are racing to adopt today’s AI tools and envisioning ways to capitalize on tomorrow’s quantum computers. But cybercriminals are a few steps ahead. This month, theNET examines ways to make the most of AI agents while augmenting security with AI-enhanced solutions and safeguarding data with post-quantum cryptography.

What is Application Security Testing?

Application Security Testing is the process of identifying, analyzing, and fixing security flaws in applications to prevent data breaches, code vulnerabilities, and cyberattacks. With applications becoming the front door to your business, ensuring they're secure is no longer optional it is critical. This video explores Application Security Testing in depth, helping you understand what it is, how it works, and why it’s essential for protecting your digital assets.