Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

VM Backup & Restore on Spectro Cloud | Live Demo for Kubernetes & KubeVirt

Watch a step-by-step live demo of how to back up and restore KubeVirt-based VMs using CloudCasa on Spectro Cloud. This walkthrough covers: Multi-tenant access VM backup workflow with CSI & non-CSI storage Policy-based scheduling & snapshot safe lock Full VM restore with namespace transform Post-restore actions and validation in Palette UI Whether you're running VMs on-prem and migrating to the cloud or need robust Kubernetes backup & disaster recovery, this demo shows you how to do it the cloud-native way.

Identity Security: A Wake-Up Call for Organizations

Digital identities are under siege. The latest Osterman Research white paper offers a sobering discrepancy between maturity and reality. The study surveyed 126 US based professionals responsible for identity security across organizations with more than 500 employees. The findings reveal a growing gap between perceived maturity and actual readiness to combat identity-led threats.

AI security: A comprehensive guide for evolving teams

The AI boom has introduced intelligent tools into most industries, not just in tech-first organizations. But the rising adoption also opens the door to new risks. ‍ Vanta’s AI governance survey found that 63% of organizations rate data privacy and protection as the top concern with AI, followed by security and adversarial threats at 50%. These numbers emphasize how urgently organizations want to prioritize defenses for AI-specific attack vectors.

CrowdStrike's Fall 2025 Release Defines the Agentic SOC and Secures the AI Era

We are living through the fourth industrial revolution: the age of AI. Just as with the steam, electricity, and the digital revolutions that preceded it, this leap forward requires a parallel leap in security. AI is transforming how businesses operate and how adversaries attack. They are moving at machine speed, compressing the defender’s response window from weeks to mere seconds.

XDR meets AIOps for Faster AI-Driven Detection and Resolution

Discover how Cato Networks helps you respond to security and networking issues quickly, easily and efficiently, in one place, with the AI power of Cato XOps. Watch this demo to see how XOps brings together XDR and AIOps to cut through huge volumes of events and alerts and provide one place to see what’s important, to investigate issues, and to mitigate threats quickly - across networking and security.

Decipher Me. What Hack Can You Detect?

What do people love more than secrets? Deciphering them. Join Etay Maor, founding member of Cato CTRL and chief security strategist at Cato, as he exposes the hidden mechanics behind AI prompt injections. From the secret codes of espionage to the subtle tricks of modern cybercriminals, this session connects the dots between history’s ciphers and today’s AI vulnerabilities. Because every secret has a pattern—if you know where to look.

Ep. 7 - You've Just Run a Penetration Test, What's Next Beyond Pen Testing

In this episode, you'll learn: What happens after a traditional penetration test? In this episode, host Tova Dvorin is joined by Adrian Culley, Senior Sales Engineer and EU lead at SafeBreach, to explore the critical evolution from legacy pentesting to continuous, automated red teaming (CART) and breach and attack simulation (BAS).

From raw data to real-time defense: A conversation with John Hammond

Explore how Elastic Security's unified platform with SIEM and XDR protections transforms SOC workflows through AI-powered analytics and consolidated security operations. Elastic Security Director of Product Management James Spiteri recently joined cybersecurity researcher, educator, and content creator John Hammond for an in-depth technical demonstration. John spends his days analyzing malware, breaking down attacker techniques, and making hackers earn their access.

Web Application Firewalls (WAFs): A false sense of security?

Web application firewalls (WAF) is a protection mechanism to help block potential malicious requests before they can reach the application itself. Often this is implemented as a proxy, intercepting HTTP requests, analyzing them, and finally deciding on an action. While effective, over relying on it could lead to a false sense of security that allows attackers to exploit unresolved internal issues.

A guide to understanding the UK Cyber Security and Resilience Bill

The UK government is strengthening its cybersecurity legislation with the Cyber Security and Resilience Bill (CSRB), an update to the 2018 Network and Information Systems Regulations. Modelled on the EU’s NIS2 Directive, the new Bill significantly expands cyber risk obligations across the UK’s digital ecosystem, targeting gaps exposed by recent high-profile breaches.