Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Secure AI coding with the 1Password hook for Cursor Agentic Coding IDE

In this video to learn how the 1Password hook for Cursor keeps your environment files secure while using AI-powered development in Cursor. See how 1Password Environments prevent plaintext API keys, hardcoded tokens, and long-lived secrets from ever touching your repo or disk.

Why MDR Matters for Building Cyber Resilience in Telecoms

Telecom networks are the backbone of the digital economy. They must deliver secure, always-on connectivity at scale, supporting everything from critical national infrastructure to everyday consumer services. But cyber resilience today is no longer defined by uptime alone. It is about the ability to withstand, detect, and respond to highly targeted cyber threats that are designed to exploit the very fabric of telecom environments.

CVE-2025-14733: WatchGuard Firebox iked Out of Bounds Write Vulnerability Exploited in the Wild

On December 18, 2025, WatchGuard released fixes for CVE-2025-14733, a critical out-of-bounds write vulnerability in the Internet Key Exchange daemon (iked) process used to establish VPN tunnels in Fireware OS, which powers Firebox firewall appliances. Exploitation of this vulnerability allows a remote, unauthenticated threat actor to execute arbitrary code. WatchGuard has confirmed in-the-wild exploitation in their advisory.

Bug bounties and broken CVEs with Bryan Brake

Join us for this week's Defender Fridays as we explore bug bounty programs, vulnerability management, and the complexities of the CVE system with Brian Break, a veteran security professional with twenty years of experience across endpoint security, consulting, and product security. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

ICS phishing with Jon Gaulding

Join us for this week's Defender Fridays as we explore ICS phishing and calendar invite abuse with John Gaulding, Full Stack Engineer at Sublime Security. John examines how attackers are weaponizing calendar invites to bypass email security defenses and create persistent attack vectors. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

World Class AI-Enabled Cybersecurity Conference - IdentityShield Summit 2026

Discover the future of Cybersecurity at IdentityShield Summit 2026 We’re inviting you to be a part of one of the biggest and boldest AI-driven cyber events, where you’ll deep dive into innovations, witness panels. It's a premier two-day event that brings together 5000+ global IT leaders, CISOs, CTOs, developers, and cybersecurity professionals. Get ready for an action-packed 2-day event! At this event, you can.

This or That. CEO Shares Favorite Cybersecurity Books in SecurityScorecard Bracket #cybersecurity

This or That. Favorite Books of SecurityScorecard Bracket, Cyber Edition is BACK – but this time it's Security Books! �� CEO and Co-Founder of SecurityScorecard Aleksandr Yampolskiy has another list of books you'll want to grab for some winter break reading and relaxation. Which ones are you hoping end up in your stocking this year? Drop a comment with your favorites and recommendations below.

Acceptable use policy template guide for powerful compliance

An Acceptable Use Policy (AUP) is a strategic compliance tool that protects people, data, and systems while setting clear expectations for technology use. A well-crafted AUP turns subjective norms into measurable rules that everyone in the organization can follow, helping mitigate legal, security, and operational risk. By standardizing acceptable behavior and linking usage rules to broader governance and risk management objectives, companies create shared understanding and accountability across teams.