How are you using ChatGPT at work? On this week's episode of, Corey Nachreiner and Marc Laliberte dig into a report on sensitive data leakage caused by AI model use. They also cover a recent report that highlights a drop in ransomware payments in 2024, as well as a recent attack targeting ASP.NET web servers.
Welcome to another electrifying episode of Server Room! This week, we’re tearing up the rulebook on cybersecurity with Santhosh Narasimhamoorthy, Manager and Technical Evangelist for Endpoint Management Security. Buckle up as we explore how AI is not just a buzzword—it’s rewriting the play book for protecting every device, user, and byte in your network. Timestamps: Perfect for: IT managers, CISOs, and anyone who’s ever side-eyed a “Nigerian prince” email.
Key Manager Plus has a brand-new UI for enhanced user experience, improved navigation, and increased customization options. We recently conducted an exclusive webinar to help our users get a first-hand look at the new UI, and learn more about all the new developments in Key Manager Plus.
Life sciences leaders gathered at SCOPE Summit 2025 to discuss the evolving landscape of clinical trials and the urgent need for modernization. The conference included sessions focused on optimizing clinical operations and trials, with topics including collaboration strategies and data analytics.
All of your data security needs, in one place. Wasn’t that easy? Rubrik Security Cloud gives your organization the power to safeguard your SaaS, Cloud, and Enterprise data with secure backups, and the confidence to recover your data rapidly. Check out the rest of our videos to get insights from security experts, watch Rubrik demos, listen to podcasts, and more!
In 2024, API-related vulnerabilities on CISA’s Known Exploited List jumped from 20% to 50%, making APIs a prime target for attackers. This sharp increase highlights the critical need for a dedicated API security strategy in 2025. Don’t wait—invest in API security today.
Recently, Palo Alto Networks disclosed CVE‑2025‑0108—a high-severity authentication bypass in the PAN‑OS management web interface. Although the flaw does not enable remote code execution, it compromises the confidentiality and integrity of management functions. In this post, we’ll break down the technical details, discuss the exploitation methodology, illustrate configuration and code examples, and outline effective mitigation strategies.
The holiday season may be over, but cybercriminals aren’t done shopping for victims. Check out how you can stay protected from these scams that put your payment details and personal data at risk.