This episode explores how dynamic, context-aware access controls can eliminate the friction between security and productivity. Learn how a Zero Standing Privilege approach protects both human and AI identities while enabling organizations to operate at full speed without compromising safety.
Event Recap: Kieran Human at Black Hat USA 2025 — ThreatLocker Unveils Configuration Defense, Achieves FedRAMP Status & More
Data Kidnapping: Because File Encryption Is So 2020 | A Brand Story with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler | A Black Hat USA 2025 Conference On Location Brand Story
Ransomware groups are increasingly abandoning file encryption in favor of high-value data theft, using extortion to extract massive payouts while avoiding the spotlight. This conversation reveals who they target, how they operate, and what organizations can do to shut down their most exploitable weaknesses.
Cybersecurity Hiring Is Not Broken—Your Job Descriptions Are | A Brand Story with Deidre Diamond, CEO of CyberSN, and Carraig Stanwyck | A Black Hat USA 2025 On Location Brand Story
This episode shifts the conversation from technology to the people powering cybersecurity success, revealing how workforce risk management transforms retention, alignment, and operational efficiency. Discover how real-time visibility into capabilities and roles empowers leaders to make smarter staffing decisions, strengthen budgets, and keep teams fulfilled.
How to Automate Cybersecurity Operations Without Coding, Crying, or Calling IT at 2 A.M. | A Brand Story with Mike Wayne, VP, Global Sales at BlinkOps | A Black Hat USA 2025 On Location Brand Story
AI-powered micro agents are enabling organizations to automate targeted tasks quickly and reliably, reducing manual work and accelerating response times in security and beyond. This conversation reveals how a platform approach can extend automation benefits from SOCs to every corner of the enterprise.
Your Business Apps Are Bringing Friends You Didn’t Invite | A Brand Story with Saša Zdjelar, Chief Trust Officer at ReversingLabs | A Black Hat USA 2025 On Location Brand Story
Commercial software supply chain risk is no longer theoretical—breaches show trusted vendors can introduce vulnerabilities or malicious code into critical environments. This episode reveals how organizations can implement technical controls to analyze and verify any software they run, turning visibility into actionable risk reduction.
Black Hat 2025: Crogl's CEO Monzy Merza Explains How AI Can Help Eliminate Alert Fatigue in Cybersecurity
The often-overlooked truth in cybersecurity: Seeing the Unseen in Vulnerability Management | A Brand Story with HD Moore, Founder and CEO of RunZero | Black Hat USA 2025 Coverage
Stellar Cyber Revolutionizes SOC Cybersecurity Operations with Human-Augmented Autonomous Platform at Black Hat 2025 | Brand Story With Subo Guha
Simplifying Security Without Sacrificing Control | A ThreatLocker Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Danny Jenkins
From Boardroom to Living Room: Securing the Modern Executive | A BlackCloak Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Chris Pierson
High-profile corporate leaders face digital risks that extend far beyond company networks, from personal email compromises to deepfake attacks. This episode explores how combining advanced technology, privacy safeguards, and concierge-level service creates an always-on shield for executives and their families.
When Bots Rewrite the Buyer’s Journey: Protecting Brand Value in the Age of AI Agents | An Akamai Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Rupesh Chokshi
Solving GRC Fatigue: How AI Is Helping Compliance Teams Do More With Less | An E-V-E GRC Brand Origin Story with Anders Søborg, Co-Founder of Eve, and Mark Humphrey
This episode explores how AI is reshaping governance, risk, and compliance by eliminating manual drudgery and delivering evidence-based, automated recommendations. Hear how Eve’s purpose-built AI platform is already transforming how organizations approach third-party risk, compliance audits, and ESG reporting.
When the C-Suite Becomes the Attack Surface | A BlackCloak Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Chris Pierson
ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Booth #1933 | A ThreatLocker Pre-Event Coverage of Black Hat USA 2025 Las Vegas
Join ITSP Magazine's Marco Ciappelli and Sean Martin as they preview ThreatLocker's exciting Black Hat 2025 presence with Detect Product Director John Lilliston. Discover upcoming major announcements, hands-on hacking demos, and how ThreatLocker's default deny approach is revolutionizing enterprise cybersecurity through comprehensive zero trust implementation.
Supply Chain Transparency Isn’t Just Technical—It’s a Business Imperative | A LevelBlue Brand Story with Theresa Lanowitz
Software supply chain visibility has moved from a technical issue to a boardroom mandate, with CEOs taking notice of the business risks tied to insecure code. In this episode, Theresa Lanowitz of LevelBlue shares why visibility matters, who owns it, and how companies can act now to reduce risk and build resilience.
Bots, APIs, and Runtime Risk: What Exposures Are Driving AI Security Innovation in 2025 | An Akamai Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Rupesh Chokshi
Dropzone AI Brings Agentic Automation to Black Hat USA 2025 | A DROP ZONE AI Pre Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Edward Wu Founder/CEO at Dropzone AI
As Black Hat USA 2025 approaches, the cybersecurity world is buzzing with innovation—and Dropzone AI is right at the center of it. With roots in Seattle and a mission to bring true intelligence into the security operations center (SOC), the Dropzone AI team is gearing up for a packed week in Las Vegas, from BSides to the AI Summit, and finally at Startup City (booth #6427).
The Proof Is in the Posture: What Real Security Maturity Looks Like | A HITRUST Brand Story with Bimal Sheth and Vincent Bennekers
What makes a security certification actually reliable—and how do you measure that value over time? In this episode, HITRUST shares findings from their 2025 Trust Report, revealing how real-world threat data, quality assurance, and continuous validation are reshaping the way organizations—and their partners—view risk, resilience, and trust.