Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Dark Side of AI: What Every Business Should Know?

Did you know? AI tools like ChatGPT, Bard, and Copilot are now being used with business platforms like Microsoft 365, Slack, and Zoom — often without your IT team even knowing! ���� �������� ����������, ����’���� ����������: ��������������������: If you're an IT admin, cybersecurity professional, or just someone curious about the intersection of AI and cybersecurity, this video will help you understand the risks and how to stay one step ahead.

EP 7- Resilience in Identity Management: Avoiding Single Points of Failure

In this episode of Security Matters, host David Puner sits down with Eric Olden, co-founder and CEO of Strata Identity, and a pioneer in modern identity management. Eric shares his career journey, from founding Simplified to leading Oracle’s global identity division, and discusses the critical importance of resilience in identity systems.

Protect your digital world with One Identity Fabric

When your IAM tools are working in conjunction, you can enjoy optimized security without falling prey to the complexity and risks associated with siloed solutions. The One Identity Fabric is an integrated solution that unifies tools from the One Identity portfolio to ensure access management, privileged access management, Active Directory management, and identity and access governance work together for seamless IAM. Join Brian Chappell, One Identity CTO, to learn the benefits of implementing this identity-first approach in your organization.

Securing OpenShift Virtualization with CyberArk: Identity Security for VMs and Containers

As organizations modernize IT infrastructure, many are adopting platforms like OpenShift Virtualization to run both traditional virtual machines (VMs) and containerized workloads on a single, unified environment. This hybrid model enables greater flexibility and efficiency, but it also introduces significant security complexity. Managing privileged access across VMs, containers and the OpenShift control plane requires a consistent, scalable and secure approach. That’s where CyberArk comes in.

Securing Red Hat OpenShift Virtualization with CyberArk: Identity Security for VMs and Containers

As organizations modernize IT infrastructure, many are adopting platforms like Red Hat OpenShift Virtualization to run both traditional virtual machines (VMs) and containerized workloads on a single, unified environment. This hybrid model enables greater flexibility and efficiency, but it also introduces significant security complexity. Managing privileged access across VMs, containers and the Red Hat OpenShift control plane requires a consistent, scalable and secure approach.

EP 7- Resilience in Identity Management: Avoiding Single Points of Failure

In this episode of Security Matters, host David Puner sits down with Eric Olden, co-founder and CEO of Strata Identity, and a pioneer in modern identity management. Eric shares his career journey, from founding Simplified to leading Oracle's global identity division, and discusses the critical importance of resilience in identity systems.

How Poor User Experience (UX) Can Undermine Your Enterprise Security

For years, cybersecurity has been chasing a future where passwords no longer exist. And yet, here we are in 2025—still resetting them, reusing them and getting breached because of them. The reality is this: despite all the talk about passwordless authentication, we still live in a password-dependent world. Credentials remain the No. 1 attack vector.

Identity Is the New Root Access: Rethinking Zero Trust in DevOps Environments

Amal Mammadov is a cloud security and detection engineering specialist working at the frontlines of identity-driven threats in modern cloud environments. His work focuses on how attackers exploit permissions, tokens, and machine identities, often without triggering traditional security controls. In this conversation, he breaks down why Zero Trust is no longer about networks but about controlling identity in fast-moving DevOps systems.