Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Are we on the path to AI defenders vs. AI attackers?

Swarms of AI bots are now being used to continuously test security perimeters. In this episode, Michael Baker, VP and Global CISO at DXC Technology, discusses the shift to AI-driven security operations. He recently met with startups working on agentic pentesting to find vulnerabilities before bad guys do. The advantage? You control these bots and get immediate feedback. The threat? Adversaries are building the exact same capabilities right now.

Ask SME Anything: What is Universal ZTNA?

Most traditional access tools (VPNs, firewalls, and NACs) were never built for today’s hybrid world. If your legacy access tool is slowing you down, you need a different approach. In this episode of Ask SME Anything, Netskope expert Francisca Segovia explains how universal ZTNA redefines secure access for every user and device, anywhere. Life’s too short for slow connections. Reimagine your access architecture now with universal ZTNA from Netskope.

Stateless vs. Stateful: The Difference in Cyber Attacks #StatefulAttack #businesslogic #apisecurity

The Hacker is Having a Conversation with Your API. There are two kinds of attacks you MUST understand: Stateless (Brute Force): One-and-done, instant gratification. Think SQL Injection. Stateful (Sophisticated): A persistent conversation over time. This is the signature of Business Logic Abuse. Why does this matter? Stateful attacks are executed by sophisticated threat actors who have done their due diligence on your architecture. You must evolve your defenses to monitor the entire session, not just single requests!

Elevating and Evolving the Role of the Channel

Nucleus Manager of Channel Enablement and Training, Tony Ramirez, talks about his recent recognition in CRN's 100 people to know for the channel. During this conversation, he also discusses the evolving role of channel leaders in cybersecurity, the importance of continuous threat exposure management (CTEM) as a process rather than a tool, and the need for contextual understanding in vulnerability management. Tony emphasizes the significance of engaging non-security stakeholders and the opportunities for the channel to educate clients on security posture and vulnerability management.

Securing and Accelerating Public Sector Networks with Cloudflare Magic WAN

Cloudflare's Magic WAN is a secure, global network service that connects enterprise locations and users with faster, more reliable performance. It replaces traditional VPNs and MPLS with a cost-effective solution, leveraging Cloudflare's extensive edge network to improve both speed and security. In this webinar, you will learn how to: Seamlessly integrate Magic WAN with Cloudflare’s security features Enhance protection against modern network threats Optimize network traffic for better performance Reduce costs compared to traditional VPNs and MPLS solutions.

How to Setup SAML SSO for Confluence Using miniOrange as Your Identity Provider (IdP)

This video tutorial walks you through the step-by-step configuration of miniOrange SAML SSO for Confluence with miniOrange as your Identity Provider (IdP). Learn how to securely integrate Confluence with miniOrange to enable seamless Single Sign-On (SSO) and centralized authentication management. With this app, you can: Enable login to Confluence using miniOrange credentials Configure robust authentication policies with miniOrange as your IdP.

How to Set Up Auto-Activation for Users in Jira | miniOrange Automated User Management

This video tutorial walks you through how to configure the automation to Auto-Activate Users in Jira using the miniOrange Automated User Management app. The video demonstrates the complete setup flow, starting with Jira automation configuration and then setting up the auto-activation rule inside the miniOrange User Management app, followed by the user flow that triggers the rule in action. Video Chapters.