Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloudflare Firewall for AI Explainer and Demo

AI is powerful, but without protections in place, it’s risky. In this explainer and demo, you'll learn how you can secure your AI-powered applications with Cloudflare Firewall for AI. The demo will show Firewall for AI detecting and mitigating threats like PII exposure, unsafe/toxic content, prompt injection, and jailbreak. Further, you'll see Cloudflare’s powerful analytics capability and how Cloudflare's AI agent, Cloudy, can help investigate threats and build and deploy Firewall for AI security policies.

Intelligent workflows: SAP's approach to SOAR in the AI era

Join SAP’s CISO and Tines’ Co-founder for a conversation on how SAP is modernizing its SOAR workflows and building an AI SOC capability with Tines. As SAP scales its global enterprise cloud services, the security team is taking a new approach to workflow automation: combining deterministic playbooks with intelligent, AI-assisted workflows that improve speed, accuracy, and visibility across security operations.

Off the Blocks | Ep. 4: What Stage Are We In With Stablecoin Adoption?

We asked industry leaders a simple but powerful question: What stage of the game are we in when it comes to stablecoin adoption? In this finale of Off the Blocks, our guests share sharp, honest perspectives on the evolution of stablecoins and the infrastructure surrounding them. From pilot projects to real-world utility Institutional use cases fueling global settlement Regulatory clarity driving momentum What’s still missing for mass adoption.

When AI writes code, who fixes the flaws?

Veracode's Chief Security Evangelist Chris Wysopal on AI's Coding Secret: 45% of Code Has Vulnerabilities Chris (aka @WeldPond), Wysopal, a veteran in application security and former member of the legendary L0pht hacker group, shares practical insights on shifting security left while embracing AI-powered development. Whether you're a CISO, AppSec leader, or developer using Copilot/GitHub Copilot, Claude, or other AI coding assistants, this discussion will change how you think about secure AI adoption.

Django Vulnerabilities Expose Apps to SQL Injection & DoS Attacks

The Django Software Foundation has released critical security fixes for CVE-2025-64459 (SQL Injection) and CVE-2025-64458 (Denial of Service) vulnerabilities. These vulnerabilities affect query construction and redirect handling in Django, putting applications and data at risk. See how AI-powered AppTrana stops these attacks from Day 0.

Hacked Architecture, Not Code: What is a Business Logic Attack? #businesslogic #cybersecurity

Why do hackers ignore your firewalls and clean code? Because they exploit your business logic and application architecture. A Business Logic Attack (BLA) is a sophisticated manipulation that uses your own system's design against you. Learn the key difference between code flaws and architectural exploits.

Jump Gate - Tanium Tech Talks #150

Customers are raving about Tanium's new remote access management solution! See a demo on today's Tanium Tech Talk. Secure shell access management for and Reduce exposure by eliminating standing privileges Create & prioritize access policies Submit requests for approval with notifications via Guide, Slack, Teams Audit activity and session logs RBAC support for auditor, user, administrator Simple setup with no additional ports to open.