Filter & Sort
  1. From Web 3.0 to Agentic AI: How Tray is Giving LLMs a Body and Brain

    Join Tray.ai CTO Alistair Russell as he traces the path from semantic web to Merlin, an agentic AI platform enabling LLMs to act with context and scale.

  2. Mastering Modern Threats: Checkpoint's Roy Barda on WAF, API, and Contextual AI 

    Explore Checkpoint’s AI-driven CloudGuard WAF with Roy Barda—proactive zero-day protection, API security, anomaly detection, and a live demo showcasing advanced threat prevention and usability.

  3. CNAPP, eBPF, and Beyond: How Sweet Security Delivers Runtime-First Cloud Protection

    Discover how Sweet Security’s eBPF-powered runtime protection and LLMs are revolutionizing CNAP, slashing response times, eliminating false positives, and securing cloud-native environments in real time.

  4. Beyond Compliance: Neil Levine Reveals How Anchore is Revolutionizing SBOM Management

    Explore SBOM evolution with Anchore’s Neil Levine, uncover new features, security insights, vulnerability ranking, and strategies to manage SBOM sprawl and future automation.

  5. Zero Trust Authorization for Non-Human Identities: A Deep Dive with Cerbos' Alex Olivier

    Explore non-human identity growth with Cerbos’ CPO Alex Olivier. Learn how Cerbos empowers zero-trust, real-time authorization for AI agents, IoT devices, and workloads.

  6. GitOps vs. DevOps: Key Differences Explained

    GitOps and DevOps are often seen as interchangeable, but they serve distinct purposes within the software delivery lifecycle. This article breaks down their differences, tools, workflows, and where they overlap. Learn how GitOps focuses on infrastructure automation using Git as the source of truth, while DevOps represents a broader cultural shift aimed at collaboration and continuous delivery. Discover how combining both approaches can streamline development, enforce consistency, and boost deployment reliability.

  7. 7 Critical API Protection Strategies to Fortify Your API Security

    As APIs power more of today’s digital services, they’ve become prime targets for attackers. Shocking data shows over 50% of APIs use no encryption or authentication, leaving businesses wide open to breaches. This article outlines seven critical strategies—from enforcing encryption and strong authentication to blocking zombie APIs and centralizing key management—that form a robust, multilayered defense. Learn how to reduce your attack surface, secure sensitive data, and protect API-driven systems from modern threats.

  8. The state of observability in 2025: a deep dive on our third annual Observability Survey

    Dive into Grafana Labs' third annual Observability Survey for 2025! Uncover how observability practices are maturing, why traces are gaining traction, the enduring power of open source, the emerging role of AI, and how cost continues to drive tool selection across organizations of all sizes.

  9. 3 ways Sweet Security reduces cloud MTTR by 90%

    Read about the main reasons why Sweet Security is the right chose to reduce MTTR and secure cloud workloads.

  10. 8 Capabilities of JFrog that can enhance Security and Compliance Throughout the SDLC

    JFrog features to improve security and compliance across SDLC—from artifact traceability to policy enforcement and continuous scanning.

  11. The Current State of Cloud Security and the Transformative Impact of AI: Insights from DOT Security

    Understand the the impact of AI on cloud security and how DOT Security is making waves

  12. Third‑Party Software Breach Puts NHS Devices and Possibly Patient Records at Risk

    Sensitive NHS data at risk after a cyberattack exploits a mobile software flaw, affecting two major UK hospitals and prompting a national investigation.

Items 73 to 84 of 433 total

Show per page