Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing AI Isn't Just About Your Pipeline #AIsecurity #DevSecOps #AppSec #redteaming

Building AI apps securely is not just about plugging tools into your dev pipeline. It’s about knowing what to do with those tools after they give you results. What risks matter? What policies should you apply? And when is the right time to integrate AI security into your CI/CD? Bar-El Tayouri sits down with Ashish Rajan from The Cloud Security Podcast to discuss why red teaming and scanning aren’t enough and how getting comfortable with AI security before production pays off long-term.

Drupal Single Sign On - Okta as OAuth Provider

This video will walk you through the steps required to configure Okta as OAuth Provider and Drupal as OAuth Client. The module allows users to log in to the Drupal site using their Okta credentials. Chapters: Don't forget to subscribe to our channel and click on a bell icon to get notifications about new uploads.

Ep 7: Everything Everywhere All At Once

The General Manager of an electric and water utility in Littleton, Mass. gets a surprise call from the FBI. At first he suspects the caller is a spammer, but soon he learns the agent is very real. Chinese hackers are lurking deep in his utility’s systems. And his is not the only one. Hundreds of other power, water and pipeline operations across the United States are getting hit. These targets have little to no intelligence value at all. But their potential for sabotage? Enormous.

Step-by-Step Guide to Real Threat Detection - Powered by Fidelis Security

In today’s threat landscape, the question is no longer “Will we be attacked?” but “How fast can we detect and respond when it happens?” The unfortunate reality is that many organizations struggle to detect threats in time—often because their tools operate in silos, their teams are overloaded with false positives, and they lack the necessary context to act swiftly and accurately.

Using CIS Hardening Scripts for Windows Server: Benefits and Risks

With each new version of Windows Server released, comes new security risks. Whilst each update enhances functionality for users, it can sometimes come at the cost of new vulnerabilities. The Centre for Internet Security (CIS) Benchmarks serve as a security baseline, helping both individuals and companies implement best practices for a secure configuration.

HR-Driven Identity and Access Management: Mini OneLogin Demo

Managing employee identities is a shared responsibility between IT and HR. OneLogin simplifies this with automated lifecycle management, connecting accurate HR data to IT systems for seamless account creation, updates and access control. Employees get fast, secure access to apps through a centralized portal.

Why does an enterprise need Endpoint Protection ?

In today's interconnected world, your endpoints are your most vulnerable targets. This video explains why every enterprise needs robust endpoint protection and introduces Fidelis Endpoint as the solution for comprehensive security. Learn how a single click from any device can compromise your entire network and why traditional security measures fail against modern, sophisticated attacks. With remote work becoming the norm, your security perimeter has expanded beyond recognition - making endpoint protection more critical than ever. Discover how Fidelis Endpoint provides.

How to achieve full-spectrum financial risk detection with AI and unified data

Financial services can’t rely on manual review alone. Discover how unified data and explainable AI are helping firms detect risk, reduce cost, and stay ahead of evolving regulations. Financial services organizations are drowning in data. From emails and Bloomberg chats to WhatsApp messages and calls, the need to review communications data to detect potential misconduct and financial crime by employees and third parties is a mandated regulatory requirement for compliance and risk teams in 2025.