Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Achieve AI-Driven Policy Hygiene & Eliminate Policy Sprawl

Firewall policies are essential, but over time, they become cluttered, misaligned, and hard to manage. That complexity puts Zero Trust and audit readiness at risk. Cato’s Autonomous Policies for Firewall as a Service (FWaaS) change that. This video shows how Cato applies AI to continuously assess and optimize your firewall policy set, removing outdated rules, identifying gaps, and simplifying ongoing management.

Why AI governance is now a CISO imperative

Let’s be real: 2024 is the year AI went from pilot to policy. And in 2025, it’s not slowing down. Every enterprise I talk to, from high-growth SaaS companies to large-scale global platforms, implements AI internally or embeds it into its products. With that momentum comes a wave of questions: Is this secure? Are we exposing customer data? What will our auditors say? CISOs are now expected to balance innovation with protection, fostering progress while staying ahead of risk.

In cybersecurity, it's an arms race.

In cybersecurity, it's an arms race. Stephanie Cohen explained why financial services are prime targets and why strong partnerships are the real armor. Banks are one of the most attacked sectors on the planet. It's not just money at stake; it's entire economies. And here’s the kicker: You're only as strong as your weakest link. Ready to rethink your cybersecurity strategy? Dive into the latest episode of The Connectivity Cloud Podcast.

80s to AI - Career Talk - Tanium Tech Talks #127

A fire side chat from the heart with Ashley, reviewing 40 years in technology and career advice for uncertain times. What is the meta-narrative of a technology career? How can I differentiate myself in the tech career field? How can I differentiate myself among other job applicants? What is the next fun tech I could tackle? How do you keep a lifelong career fresh and fun? What are my options in a tech career?

The Evolution of Identity

From managing simple passwords to securing complex, cloud-native environments, how has identity management really changed? In this thought-provoking discussion, JumpCloud CEO Rajat Bhargava and CTO Greg Keller are joined by Rak Garg (Bain Capital Ventures), and Francis Odum (The Software Analyst) to challenge conventional thinking. They delve into the tension between usability and security, the risks of vendor lock-in, and the urgent need for identity solutions that can bridge the gap between legacy systems and the dynamic demands of cloud-native environments.

Introducing AI-Driven Policy Management for Better Security

Firewall policy management has reached a critical point, characterized by misconfigurations, overly complex rules, and ongoing audits. The burden continues to fall on already-stretched security teams. For CISOs, the question isn’t whether policies are being enforced; it’s whether they’re aligned, effective, and resilient across every location and environment.

Enabling Safe AI Adoption: Insights from Nightfall AI and Vanta

How should data security teams walk the fine line between enabling AI innovation, safeguarding sensitive data, and ensuring compliance? That question drives everything we build at Nightfall. It’s also an excellent jumping off point for an in-depth discussion among security experts.

SOAR & DSDL: Crossover for Agentic AI Workflow

Recently we released the Splunk App for Data Science and Deep Learning (DSDL) v5.2.0. This update introduced new features for integrating large language models (LLMs) and retrieval-augmented generation (RAG). With DSDL v5.2.0, users can easily perform LLM prompts, vector searches, RAG, and function calling directly from the app's dashboards.