Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

FAIK Everything: The Deepfake Training Playbook

Learn how to understand, combat, and even create synthetic media in this essential deepfake training session with Perry Carpenter, KnowBe4's Chief Human Risk Management Strategist. Deepfakes and synthetic media are no longer futuristic threats—they are here now, and organizations are already experiencing deepfake-related attacks. A May 2024 study showed that 25.9% of organizations have experienced deepfake-related attacks, with other indicators suggesting the number may be closer to 90%. It is high time to prepare people to deal with this evolving threat.

Phish No More: Instant Defense with Cato SASE

Phishing remains one of the most common ways attackers try to breach enterprise environments. Traditional tools often detect these attempts too late, giving attackers time to gain a foothold. In this demo, you’ll see how the Cato SASE Cloud Platform stops phishing attempts in real time. Cato inspects every click, evaluates threats instantly, and blocks malicious sites before they load, without slowing users down.

How to detect React2Shell attacks using network-based threat hunting

How do you find React2Shell vulnerabilities or detect React2Shell attacks in real environments? In this video, Corelight cloud security researcher David Burkett walks through how to threat hunt React2Shell by focusing on post-exploitation behavior at the network level. Instead of relying on exploit signatures, the approach uses application baselining and network traffic analysis to identify abnormal behavior.

The Author's Take: The Past, Present, & Future of Third Party (Cyber) Risk Management

“It is also a common trap of giving inexperienced customers a false sense of security…”~Navigating Supply Chain Cyber Risk TPRM processes today are filled with thousands of pages of questionnaires, assessments, and more, but does that status quo really help secure your vendor ecosystem? Join Aleksandr Yampolskiy (CEO & Co-Founder, SecurityScorecard) and Alex Golbin (Co-Author, Navigating Supply Chain Cyber Risk) as they chat about.

UI Migration Guide - miniOrange SAML SSO + SCIM Provisioning App Bundle for Bitbucket

We’ve redesigned the miniOrange SAML SSO + SCIM Provisioning app for Bitbucket with a new bundled interface to make authentication and user provisioning simpler, faster, and more efficient. This video is your step-by-step guide to understanding what’s new, where to find your settings, and how to make the most of the updated dashboard. What You’ll Learn Unified Dashboard Navigation – Manage SAML SSO and SCIM provisioning from one central place.

Security at Scale: Why Specialization Matters More Than Ever

Security at Scale: Why Specialization Matters More Than Ever In this clip from the A10 Networks discussion “APIs Are the Language of AI — Protecting Them Is Critical,” A10 security experts Jamison Utter and Carlo Alpuerto break down why specialization is becoming essential in modern security operations. They explain how rapidly evolving threats, AI-driven scale, and expanding API ecosystems are reshaping how teams must organize, collaborate, and defend critical infrastructure.