Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EASM Buyer's Guide 2025: A guide for a futureproof EASM solution

Your external attack surface is growing — whether you’re aware of it or not. Cloud migration, IoT, AI, and remote work are all contributing to the rapid expansion of organizations’ external attack surfaces, and many security teams are struggling to keep up. According to a 2021 report, 69% of organizations admitted they had experienced at least one cyberattack that was initiated through exploiting an unknown or unmanaged internet-facing asset.

Exposing the Blind Spots: CrowdStrike Research on Feedback-Guided Fuzzing for Comprehensive LLM Testing

The increasing deployment of large language models (LLMs) in enterprise environments has created a pressing need for effective security testing methods. Traditional approaches, relying heavily on predefined templates, are limited in comparison to adaptive attacks — particularly those related to prompt injection attacks. This limitation becomes especially critical in high-performance computing environments where LLMs process thousands of requests per second.

Cybersecurity Innovation at LevelBlue | Rakesh Shah on What's Next

What does the future of managed security services look like? Rakesh Shah, VP of Product Management at LevelBlue, breaks down the roadmap ahead in this forward-looking video. Discover how LevelBlue is simplifying security offerings, modernizing service delivery, and introducing a clear “good-better-best” tiering model to give customers more choice and control.

Cybersecurity GTM Strategy in Action | Tawnya Lancaster, LevelBlue

How do you align cybersecurity services with what the market really needs? Tawnya Lancaster, Director of Product Marketing and Market Research at LevelBlue, shares how her team transforms global market insights into impactful go-to-market strategies. Learn about the rollout of flexible new service tiers across managed detection & response, vulnerability management, and network/cloud security.

Understanding Runtime Reachability 5th Episode

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

So your chatbot just insulted a customer? #cybersecurity #appsec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Brivo Access: How to Create Incidents With Incident Management

As a security team member, being able to quickly create and document incidents is crucial for efficient troubleshooting and accurate record-keeping. Incident Management helps streamline evidence gathering, including pulling relevant footage. It minimizes manual documentation, and helps customers resolve incidents fast. This video will show you how to create a new incident from an event, and how to link an event to an existing incident.

NHS Cybersecurity Crisis: Who is Actually Protecting Your Medical Records?

NHS cybersecurity is on life support — can we fix it before patients pay the price? In this episode of Razorwire, host James Rees sits down with Rob Priest (former NHS insider and security expert at Rubrik) and returning guest Richard Cassidy to unpack the real, lived impact of cyber attacks on the UK’s healthcare system — from ransomware crippling hospitals to outdated systems putting lives at risk.