Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

GitLab's CISO Josh Lemos on the pros and cons of making security practices public

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Josh Lemos, CISO at GitLab. Throughout his 15-year career in security, Josh has led teams at ServiceNow, Cylance, and Square. Known for his expertise in AI-driven security strategies, Josh is also a board member with HiddenLayer. He drives innovation at GitLab with a relentless focus on offensive security, identity management, and automation.

Brex's CISO Mark Hillick on avoiding tool bloat and learning from high-severity incidents

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Mark Hillick, CISO at Brex. Mark’s experience in the security industry spans more than two decades. He started out as a security engineer at Allied Irish Banks before advancing through companies like MongoDB to become Director and Head of Security at Riot Games. His book, The Security Path, features over 70 interviews with security professionals on their career journeys.

Take the fear out of phishing response: Lessons from Material Security

For modern security teams, phishing remains one of the most persistent and resource-intensive challenges their organizations face. But automating the detection and response to phishing attacks not only saves time, but also reduces errors and strengthens your organization's overall defense.

How LivePerson automates vulnerability management to reduce risk

For modern security teams, managing vulnerabilities efficiently is critical to reducing risk and maintaining a strong security posture. However, the sheer volume of vulnerabilities, complex IT environments, and resource constraints make traditional approaches unsustainable. Automating key aspects of vulnerability management not only speeds up remediation, but also ensures consistency and accuracy across the entire vulnerability lifecycle.