Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Smarter API Security Demo: See How Wallarm Protects Modern APIs and Agentic AI

Modern APIs are under constant attack—from botnets to logic abuse to threats targeting Agentic AI. Most security tools lag behind. Wallarm doesn’t. Join us for a live walkthrough of Wallarm’s advanced API security platform. In this session you will see how to instantly discover vulnerable endpoints, protect business-critical flows, and stop API abuse—without slowing down your teams. What you'll learn.

EP 10 - A new identity crisis: governance in the AI age

In this episode of Security Matters, host David Puner sits down with Deepak Taneja, co-founder of Zilla Security and General Manager of Identity Governance at CyberArk, to explore why 2025 marks a pivotal moment for identity security. From the explosion of machine identities—now outnumbering human identities 80 to 1—to the convergence of IGA, PAM, and AI-driven automation, Deepak shares insights from his decades-long career at the forefront of identity innovation. Listeners will learn.

Beyond Traditional Threats: The Rise of AI-Driven API Vulnerabilities

AI has had dramatic impacts on almost every facet of every industry. API security is no exception. Up until recently, defending APIs meant guarding against well-understood threats. But as AI proliferates, automated adversaries, AI-crafted exploits, and business logic abuse have complicated matters. It’s no longer enough to merely patch known flaws; security teams must now contend with intelligent, adaptive attacks that evolve as fast as the technology they target.

Cloud Security's Unspoken Truth

Every DevSecOps, cloud security and even AppSec team knows the feeling: scanners flag hundreds – sometimes thousands – of critical issues across your pipelines, environments and apps. But how many of those findings actually matter? How many represent real, immediate risk to applications running in production? The uncomfortable answer? Very few. At ARMO, we’ve seen firsthand how over 60% of security findings are irrelevant hypothetical risks that will never be exploited.

Securing AI code at the source: Mend.io now integrates with Cursor AI Code Editor

AI is reshaping software development quickly. From boilerplate generation to test automation and refactoring, LLMs like the one behind Cursor are transforming how developers build. But with great power comes a new generation of vulnerabilities. At Mend.io, we’re excited to announce a native integration with Cursor, the IDE taking the dev world by storm.

Streamlining Document Processes with Output Management Software

In today's fast-paced business environment, efficient document handling is crucial. Output Management Software (OMS) plays a pivotal role in automating and optimizing the way organizations manage and distribute their documents and data outputs. By centralizing document workflows, OMS enhances productivity, reduces costs, and ensures compliance with regulatory standards.

Choosing the Best Board Portal for Your Nonprofit Mission

Decentralized teams and mounting compliance requirements make nonprofit boards search for better alternatives to traditional document sharing via Google Drive and Gmail. Picking a board portal can reduce the inefficiencies in the boardroom and help members focus on mission-critical tasks instead of administrative burdens. This guide provides a checklist of the best board portal features for nonprofits, along with selection and implementation tips.

Modernising the Grant Process: Time-Saving Tools for a Stress-Free Experience

If you've ever worked on a grant program, you know what I'm talking about. The stacks of documents, the maze of spreadsheets, the endless email tag, and the specter of a compliance audit hanging over your head. For decades, this administrative drudgery has been tolerated as an evil necessary for securing funding. But what if it doesn't have to be this way? The inefficiency and stress of old-school grant management are not only frustrating; they actually take resources away from your organisation's central cause.

Data Governance: A Comprehensive Guide to Implementation

Implementing effective data governance in an organization requires a strategic approach that encompasses several key components. The first step is to establish a clear vision and objectives for data governance. This involves defining what data governance means for your organization and identifying the specific goals you aim to achieve. These goals could include improving data quality, ensuring data security, or enhancing data accessibility.