Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Daniel dos Santos on defending against opportunistic cyberattacks

Complicated, targeted attacks aren’t the only methods you should be on the lookout for. Security fundamentals are important for defending against opportunistic that can cause chaos! On this episode of Data Security Decoded, Daniel dos Santos (VP of Research, Forescout Technologies) and host Caleb Tolin explore attacker motivations, common entry points, and what defenders must prioritize now. Listen to the full episode on our YouTube channel, or wherever you get your podcasts.

EP 26 - The tyranny of the now: identity at machine speed

Security teams are under more pressure than ever, reacting at human speed while systems, identities, and AI agents operate at machine speed. In this episode of Security Matters, host David Puner sits down with cybersecurity leader and former FBI executive MK Palmore to explore why defenders struggle to keep pace and what it takes to regain control.

Understanding the ENS Framework: A Guide to Spain's National Security Framework

As governments continue to digitize services, the number of systems that support public administration continues to grow. With this expansion comes greater cybersecurity risk. To address these risks, Spain established the Esquema Nacional de Seguridad (ENS), a national framework designed to protect information systems used by public sector organizations. ENS defines the security requirements that ensure government systems remain secure, reliable, and resilient.

Five Activities That Indicate an Early Insider Threat

Most insider threats do not start with obvious intent. They start with small changes: A file gets downloaded that does not need to be or a user accesses data outside their usual scope. Information gets shared in ways that feel slightly off. Each action on its own can look harmless, but together, they point to insider risk. That is what makes insider threat indicators hard to catch for security teams. You are not looking for a single violation. You are looking for patterns in how people interact with data.

How KeeperPAM Integrates With CNAPP

Description: Cloud-Native Application Protection Platforms (CNAPPs) provide visibility into cloud risk, but without a Privileged Access Management (PAM) solution, organizations cannot enforce secure access with CNAPPs alone. In this video, learn how KeeperPAM integrates with CNAPPs to enforce zero-trust, least-privilege access across cloud-native environments.

AI Impact Summit 2026 Highlights | FinTech, AI & Data Security Insights #ai

AI Impact Summit 2026 Highlights | AI, FinTech & Data Security Insights from Delhi This video covers our 5-day experience at AI Impact Summit 2026 in New Delhi, one of India's leading technology events focused on Artificial Intelligence, FinTech, Data Security, and Compliance. During the summit, we connected with industry leaders, CISOs, FinTech professionals, and AI innovators, discussing the latest developments in data protection, AI governance, cybersecurity, and enterprise AI adoption.

Effective Account Takeover Mitigation Playbook: Real-Time ATO Response Framework

Account takeover mitigation is the process of detecting, containing, and preventing unauthorized access to user accounts before financial or reputational damage occurs. Effective mitigation depends on real-time detection, rapid response, and automated playbooks. Modern account takeover attacks execute in minutes. Credentials are harvested in real time through phishing, reverse proxy phishing, and man-in-the-middle techniques. Attackers often attempt login seconds after a user submits credentials.

The 2026 Remote Work Stack: Essential Tools and Resources for Distributed Teams

Building a remote team is easy. Scaling one without losing your mind—or your data—is the hard part. As a team that has spent a decade in the trenches of the "Workforce Analytics" world at CurrentWare, we’ve seen the same pattern repeat: companies transition to remote work, they nail down their communication (Slack), they secure their perimeter (VPNs), and then they hit a wall. That wall is Operational Friction.

AI Deepfakes & Laptop Farms: Inside the 2026 Cloudflare Threat Report

In this episode of This Week in NET, host João Tomé is joined by Cloudflare threat intelligence experts Brian Carter and Chris Pacey to break down the 2026 Cloudflare Threat Report and what it reveals about today’s cyber threat landscape. We discuss how threat intelligence helps organizations prioritize risks, how attackers are increasingly leveraging automation and AI tools, and why botnets, supply-chain attacks, and credential-theft campaigns continue to evolve.