Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Let's Talk Security: The Quantum Threat & Migration to Post-Quantum Cryptography (PQC)

Forescout CEO Barry Mainz is joined by Forescout's Robert McNutt, Chief Strategy Officer, and Daniel dos Santos, Sr. Director of Research at Vedere Labs, to discuss the adoption of post-quantum cryptography (PQC) and how to overcome hurdles.

Why Legacy DLP Fails and What Cyberhaven Does Differently - Full Video

In this lightboard session, we break down how organizations classify and protect sensitive data—and why traditional methods fall short. You’ll see how Cyberhaven reimagines data security with lineage-based protection that works across files, systems, and formats. Watch to learn: The difference between data maps, tags, and labels The limitations of legacy classification (persistence & breadth)

JumpCloud vs. Kandji: Is Your IT Platform Built for a Diverse World?

Don’t settle for an Apple-only approach when your IT environment is diverse. This video reveals the critical difference between a single-focus point solution like Kandji and a unified platform that brings together identity, access, and device management. Learn why a holistic solution is essential for true UEM, controlling the entire user lifecycle, and ensuring a single secure identity for every resource in your multi-platform business.

The Workday Breach: Why Your DLP Strategy Is Already Obsolete

The Workday breach isn't just another security incident—it's a blueprint for how modern attackers are systematically dismantling traditional Data Loss Prevention (DLP) strategies. When a company renowned for security excellence falls victim to social engineering that bypasses every conventional control, it's time to fundamentally rethink your approach.

Beyond Legacy Pen Tests: What to Look for in a Modern Internal Security Validation Platform

If you’ve decided relying on annual penetration tests isn’t enough anymore (smart move), the next question is: “What’s the best way to continuously prove — and improve — our internal security posture?” There’s no shortage of platforms out there promising to be your automated red team, internal pentester, or attack-surface explorer. But dig deeper, and you’ll see not all of them are built the same.

Brivo Door Station Installation for Admins

In this video, we’ll walk Brivo Access admins through the essential steps to set up a Brivo Door Station. As an admin, you’ll learn how to:・Test live video and intercom directly in Brivo Access・Test video and intercom using Brivo Mobile Pass・Set up users with physical, mobile, and faceprint credentials By the end of this guide, you’ll be ready to manage and support your Brivo Door Station with confidence.

Brivo Door Station Installation for Technicians

This video is designed for technicians installing the Brivo Door Station. We’ll cover the key steps you need to get the hardware set up, connected, and verified. As a technician, you’ll learn how to:・Connect the Brivo Door Station to a control panel;・Ensure OSDP connectivity;・Configure the Brivo Door Station to communicate with the Brivo cloud;・Troubleshoot the Brivo Door Station. By the end, you’ll have the Brivo Door Station properly installed and ready for testing.

10 Critical Capabilities of API Detection and Response

Web Application and API Protection (WAAP) solutions have become increasingly vital in today’s cybersecurity strategies, providing essential defenses against attacks targeting web applications and APIs. It’s no surprise that APIs are growing in popularity, with 80% of companies reporting that more than half of their applications depend on APIs—a figure projected to reach 88% within the next 24 months (ESG Research, 2025).

The New Frontier: Why You Can't Secure AI Without Securing APIs

The release of a new KuppingerCole Leadership Compass is always a significant event for the cybersecurity industry, offering a vendor-neutral view of the market's current state. The 2025 edition, focusing on API Security and Management, is critical as it arrives at a pivotal moment for technology. It clearly presents a fact many organizations are just beginning to understand: the crucial connection between the rise of Artificial Intelligence and the necessity for robust API security.

Executive Deepfake Defense Strategies: 7 Proven Tactics to Stop CEO Fraud

Deepfake attacks targeting executives are no longer a sci-fi scenario—they’re a real, escalating threat. In 2024 alone, over 105,000 deepfake incidents were reported in the U.S., contributing to $200 million in financial losses in Q1 of 2025. Scammers deepfake voices and videos of CEOs or CFOs to coax employees into sending money or exposing sensitive data. The sophistication and accessibility of this technology demand layered defenses—both human-focused and tech-driven.