Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Rubrik Zero Labs Uses LLMs to Analyze Malware at Machine Speed with Amit Malik

AI is changing how malware is built, and how it’s caught. In this episode, Caleb Tolin is joined by Amit Malik, Staff Security Researcher at Rubrik Zero Labs, to unpack how large language models are transforming malware analysis, enabling defenders to sift through thousands of samples and surface truly novel threats. From Chameleon malware abusing WSL to AI-generated attack code, this conversation explores what real data resilience looks like in an AI-driven threat landscape.

SPARK 25: Deribit Scales Crypto Options Infrastructure with Fireblocks

This is what crypto options infrastructure looks like at scale. Deribit needed to onboard custodians and expand collateral support without months of technical integration for each new relationship. Luuk Strijers, CEO of Deribit, knew they needed a partner with the security, flexibility, and network to scale faster without compromise. That partner was Fireblocks. Full wallet infrastructure across hot, warm, and cold storage Seamless expansion of collateral and coin support Frictionless custodian onboarding through Off Exchange.

What is Vibe Coding? #vibecoding #aisecurity #coding

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

The AI Authorization Revolution: Why "Who Can Do What" Is the New Security Battleground

Remember when security was simple? Users had roles. Roles had permissions. Done. Those were the days when your biggest worry was whether someone from marketing accidentally got admin access to the finance system. Welcome to 2026, where that simplicity is dead.

Why Protecto Uses Tokens Instead of Synthetic Data

On the surface, synthetic data looks like the safer option. It’s not real. It doesn’t point to an actual person. It can be reversed if needed. And it keeps systems running without exposing sensitive values. That logic makes sense. Until you look at how systems actually behave. Protecto supports both reversible synthetic data and tokenization. Referential integrity can be preserved either way. Mapping back is not the hard part. The difference is not whether you can recover the original value.

Introducing Mend.io's AI Security Maturity Survey + Compliance Checklist available today

Today, we’re excited to launch two practical tools to help teams quickly understand their AI maturity, quantify AI risk, and gather the evidence executives will ask for in 2026: an interactive AI Security Maturity Survey (with a personalized score and mapped recommendations) and a companion AI Security Compliance Checklist. Both are aligned to industry standards and built to be immediately useful in discovery, audits, and planning.

LimaCharlie Announces Agentic SecOps Workspace, Redefining AI in Security Operations

Sr. Technical Content Strategist LimaCharlie is announcing their Agentic SecOps Workspace, a security platform that elevates AI from an advisory role to an operational one. This is a key development for security teams who recognize that AI must offer more than chat interfaces, simple alert triage or next-step recommendations. To keep pace with modern threats and business needs, AI must be allowed to operate and scale.