Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Turn Visitors into Buyers: How to Reduce Customer Drop-Off & Increase Conversion | Shopify Webinar

Over 70% of customers abandon their carts before checkout, and most stores never figure out why. In this exclusive webinar, we break down why Shopify visitors abandon their carts, where the drop-offs occur, and how to win them back with smart re-engagement strategies and powerful analytics tools. From identifying drop-off points to fixing friction and boosting conversions, we’ve covered it all! What You’ll Learn.

Catch Bugs Faster: Cursor's BugBot for AI Code Review

In this video we dive into Cursor's 1.0 release, focusing on their new BugBot feature. This AI-powered tool integrates with your GitHub workflow to automatically review pull requests and identify potential bugs. We'll show you how to set up BugBot, trigger it on a pull request, and analyze the issues it finds, including a real-world example of it catching errors in AI-generated code from Google's Jules tool.

The New Threat Landscape: AI-Native Apps and Agentic Workflows

Businesses are moving beyond AI experiments and proofs of concept. As we approach what IDC is predicting will be the “AI pivot years” of 2025-2026, organizations are prioritizing, planning, and building for scale. This shift includes AI agents — self-directed tools that automate tasks — as technology providers strive to simplify development workflows. Under the surface, AI systems expose an expanded threat landscape that spans the software development lifecycle (SDLC).

Stablecoins in Banking: Strategic Insights from the 2025 Survey

The strategic conversation around stablecoins has moved beyond innovation labs and pilot programs. It’s now a focus in executive leadership meetings and shareholder reports. In June, Bank of America’s CEO highlighted stablecoins as a potential new form of transaction account, one the industry must be ready for. SMBC has signed a multi-party MOU to explore wholesale stablecoin infrastructure.

How Human Behavior Can Strengthen Healthcare Cybersecurity

Few sectors exemplify the enormous value of data as healthcare does. From the relatively mundane, such as digitalizing patient data for streamlined care, to the extraordinary, like the use of AI to revolutionize prostate cancer diagnosis and care, data is the lifeblood of modern healthcare and, as such, must be protected. For years, we have been told that humans and human error are the weakest link in cyber defenses, but it's time to challenge this notion.

Are WAFs Obsolete? Pros, Cons, and What the Future Holds

Web Application Firewalls (WAFs) have long served as the front line of defense for web applications, filtering out malicious traffic and enforcing security policies. But as threats grow more sophisticated and application environments become more dynamic, many are questioning whether traditional WAFs are still up to the task. In 2025, with the rise of cloud-native applications, APIs, and machine learning-driven attacks, it's no longer enough to rely on static, rule-based filtering.

KnowBe4 Collaborates with Microsoft: Strengthening Email Security Through Strategic Integration

In today's rapidly evolving threat landscape, cybercriminals are becoming increasingly sophisticated in their attack methodologies, particularly when it comes to email-based threats. Organizations worldwide are recognizing that a single-vendor approach to security, while valuable, may not provide the comprehensive protection needed to defend against the full spectrum of modern cyber threats.

GitGuardian Partners with GuidePoint Security to Strengthen Application Security Offerings

GitGuardian and GuidePoint Security have partnered to deliver enhanced secrets detection and non-human identity security solutions to North American customers, offering tools to combat secrets sprawl and mismanaged identities.

The Top 3 Hyperautomation Use Cases for Torq POCs

Many organizations come to Torq when they’ve hit a wall with their legacy SOAR platform. The migration to Torq isn’t just a technology upgrade — it’s an operational overhaul. With Torq, enterprises have replaced hundreds of rigid playbooks in weeks, dramatically reduced time-to-value, and unlocked capabilities that legacy SOAR could never support.