Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Vanta SVP of Engineering on Modern CTO Podcast: "How hard can it be?"

"How hard can it be to just ship an AI feature?" Our SVP of Engineering, Iccha Sethi, asked her team this. Just once. Turns out building in the age of AI is a fundamentally different problem, from managing model drift to rethinking what "done" even means. Iccha joined @ModernCTO to get into all of it.

Falcon Data Security: Stop Data Loss, Not Productivity - End-User Justification & Forensics Capture

End the rigid, binary choice of traditional DLP. Falcon Data Security changes the game by using End-User Justification (EUJ) to educate employees at the point of risk, empowering them to make smart security decisions and keeping legitimate business transfers moving. For full context and compliance, Forensic Capture gives your security team the complete story with encrypted file retrieval and screen recordings of user activity before and after the event. Watch the demo to see how to maintain security without slowing down your team.

SecurityScorecard Weekly Brief: The Cyber Risk and Policy Edition - Amanda Smith

In this week’s Weekly Brief: The Cyber Risk and Policy Edition, SecurityScorecard’s Director, Public Sector Channel Amanda Smith unpacks the complexity of government procurement in the expansion of public sector vendors and how that impacts the technologies available to government entities. Historically, government partners have been slowed down by the nature of the government procurement process but changes implemented by the administration are changing this precedent.

Are You Behind on Patching? | CISA KEV vs. Third-Party KEVs

Are you relying solely on the CISA KEV list for your vulnerability management? You might already be behind. In this video, Rob Babb, Exposure Management Strategist at Seemplicity, discusses why waiting for a vulnerability to appear on the CISA KEV list can leave your organization exposed for weeks. In this video, you’ll learn: It's time to break the cycle of technical debt. Learn more at: seemplicity.ai.

AI: The hero's journey with Ken Westin

Join us for this week's Defender Fridays as Ken Westin, Senior Solutions Engineer at LimaCharlie, shares his AI journey and what the hero's journey framework reveals about how security professionals can move from hesitation to genuine mastery of AI tools. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Breaking the Cycle of Technical Debt with Agentic Exposure Management

In this video, Rob Babb, Exposure Management Strategist at Seemplicity, shares key insights from a presentation at ISACA Atlanta’s Geek Week regarding breaking the cycle of technical debt through agentic exposure management. The discussion focuses on why standard scoring methods like CVSS are often insufficient on their own for effective vulnerability prioritization.12 Key Topics Covered: For more information on agentic exposure management, visit: seemplicity.ai.

Meet GitGuardian's AI Assistant: Natural Language Queries Across All Your Incidents

See how the GitGuardian Assistant helps teams investigate, understand, and remediate secret incidents directly from the GitGuardian workspace. In this preview, Mathieu and Dwayne walk through how the assistant uses incident context, workspace details, and GitGuardian documentation to answer questions, suggest next steps, and help manage incidents through natural language. It can explain threat patterns, assess scope and impact, recommend remediation steps, assign incidents, update tags, and propose changes to incidents.