Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Inbar Raz - Living off Microsoft Copilot | DevSecNext

What happens when hackers weaponize Microsoft Copilot? In this eye-opening session, Inbar Raz takes a red-team-level deep dive into how attackers can abuse Copilot to exfiltrate data, bypass security controls, and even social engineer victims—automated by AI. This talk was recorded at DevSecNext, a community-driven event reimagining how we share security insights—short, to the point, and packed with actionable takeaways.

Erik Zaadi - Platform Engineering to the Rescue: Making DevSecOps Work for Everyone | DevSecNext

How can organizations make DevSecOps accessible and effective for every team? Platform Engineering is the answer. In this talk, Erik explores how developer portals and golden paths help streamline security, automate remediation, and create scalable, secure development workflows without adding friction. This talk was recorded at DevSecNext, a community-driven event reimagining how we share security insights—short, to the point, and packed with actionable takeaways.

Panel Discussion - The Evolving Threat Landscape: Risks in the Age of AI Disruption | DevSecNext

As AI reshapes industries, it also introduces a wave of emerging security risks—some known, others yet to be discovered. In this DevSecNext panel discussion, experts from engineering, cloud business, venture capital, and security innovation dive deep into the intersection of AI disruption and the evolving threat landscape. This talk was recorded at DevSecNext, a community-driven event reimagining how we share security insights—short, to the point, and packed with actionable takeaways.

Yonit Gruber-Hazani: Securing the Pipeline: Remediating CI/CD Vulnerabilities with SLSA | DevSecNext

Software supply chain attacks are on the rise, exploiting gaps in CI/CD pipelines to introduce malicious code. In this talk, Yonit Gruber-Hazani dives deep into common CI/CD vulnerabilities and how to mitigate them using the SLSA (Supply-chain Levels for Software Artifacts) framework. This talk was recorded at DevSecNext, a community-driven event reimagining how we share security insights—short, to the point, and packed with actionable takeaways.

The Spy Who Searched Too Much: Insider Threat Lessons from the Rippling-Deel Lawsuit

The recent Rippling-Deel lawsuit is a stark reminder of the devastating impact of insider threats. This high-profile case between two HR tech unicorns reveals how vulnerable even the most innovative companies can be when protecting their trade secrets from within. What could Rippling have done to catch the alleged spy in the first place? We’ll walk you through the case and highlight how an insider threat platform could have detected and prevented the incidents earlier.

How to Effectively Train Your Employees on Cybersecurity

Welcome to the Data Security Decoded podcast. In this episode, our host, Richard Cassidy, is joined by Carolin Desirée Toepfer, founder of Cyttraction and CISO as a Service for multiple organizations across Europe and North America. Carolin shares her journey from building websites and online communities to becoming a cybersecurity leader, offering insights into the unique challenges of European cybersecurity, AI security frameworks, and transforming cybersecurity training into data integrity training that better aligns with business needs.

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster - Part 1

Picture this: an always-awake, never-tired, high-speed librarian that instantly finds the exact information you need from a massive collection of books. This extraordinary librarian is also capable of processing millions of requests simultaneously, understands partial or misspelled words, and even predicts what you’re looking for before you finish asking.

Passwords, a necessary evil: Are We Ready for a Passwordless World?

Performance reviews, insurance, root canals, speed bumps, and income taxes are but a few things we might consider life’s “necessary evils.” Let me add another one to the list: passwords! For decades, PINs and passwords have been the backbone of online security, but let’s face it, they’re almost always cumbersome, annoying, and far from perfect.