Watch VP of Engineering for Graylog API Security Robert Dickinson take you through a detailed demo of API Security. Find out how to discover your APIs, find attacks, and block them.
Simplify Compliance & Security with Cato’s Application-Aware LAN Firewall! In a distributed, cloud-first world, ensuring networking and security compliance is more challenging than ever. VLANs lack the granularity needed to enforce strict regulatory controls, and traditional firewall appliances add cost, complexity, and management overhead. What if you could extend your FWaaS to enforce microsegmentation inside the LAN?
This week’s briefing covers: KTA080 (CLOP) Update CL0P has recently published files from victim organizations that were last revealed from the E-H listing around February 24, 2025. Some victim organizations were removed from the E-H listing as well as the H-W listing, likely due to negotiations with the threat actor group to refrain from sensitive data to be published. Additional victim companies have also been published outside of the E-H listing.
New APIs are attacked in just 29 seconds, according to Wallarm’s API honeypot test. Batch requests can extract 10M records in under 10 seconds, making real-time protection essential. Learn how to secure APIs before attackers strike.
Rapid, reliable has never been so easy. Keep your business moving forward at lightning speed with Turbo Threat Hunting. With the ability to proactively scan 75,000 backups in less than 60 seconds, you can recover and get back up to speed in record time. Time is money, especially when it comes to recovering and getting your business back up and running!
Aysha Khan, CIO & CISO at Treasure Data, drops a truth bomb: "Security isn't a tech problem—it's a BUSINESS problem." In this eye-opening clip from, Aysha explains why cybersecurity deserves a seat at the board table and how empowering your CISO creates true organizational resilience. Listen to the full episode to discover why your security strategy might be fundamentally flawed!
The security landscape for financial institutions has changed dramatically in recent years. Banks and credit unions face an onslaught of attacks unlike anything security professionals have ever seen before. As 2025 progresses, these threats aren’t letting up – they’re getting worse, forcing financial organizations to completely rethink how they protect sensitive data.