Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Tools That Help You View Difficult Content Safely

When your job involves looking at distressing or graphic material, there are ways to reduce the impact. Therapist Eve Parmiter shares practical tools and techniques – like muting audio, using blur overlays, or limiting your screen view – that help professionals stay regulated while still doing the work.#CyberSecurity.

Have we reached true anonymous AI? #cybersecurity #ai

PromptLock ransomware represents a chilling evolution: AI that makes real-time decisions about your data. Unlike traditional ransomware that blindly encrypts everything, this malware uses a locally-hosted LLM to analyze file contents and decide whether to exfiltrate or encrypt based on what it finds. It's essentially agentic AI making autonomous threat decisions.

Security Potpourri: SOCs, automation, and penetration testing with Cliff Janzen

Cliff Janzen, CISO and VP of Security Services at Arctiq, joined us for Defender Fridays for a special "Security Potpourri" session! What's on the menu? > SOC operations and optimization> Security automation strategies> Penetration testing insights> The current state of security landscape> All through Cliff's expert lens and real-world experience.

Enrich, Parse, and Control Logs with Observability Pipelines for Datadog Cloud SIEM

See how Datadog Observability Pipelines helps security and operations teams take control of their log data. In this demo, we’ll walk through: With Datadog, you can normalize, enrich, and prepare high-quality log data for Cloud SIEM, supporting faster investigations, more accurate detections, and reduced operational overhead—all without third-party software.

Scattered Spider: the Evolution of Identity-Based Ransomware

Identity-based ransomware is no longer a fringe tactic; it’s becoming the playbook of today’s most dangerous adversaries. Scattered Spider, a financially motivated e-crime group, has shifted the model from smash-and-grab encryption to a far more devastating combination of double extortion, social engineering, and hypervisor encryption attacks.

MSP Zero Trust Analysis Map

Uncovering your clients’ hidden security gaps just got easier. Our new Zero Trust Gap Analysis Map helps you quickly identify where your clients are vulnerable, turning a complex topic into a clear, actionable conversation. In this video, we'll show you how to use this free, five-minute Google Sheets-based tool to assess a client's Zero Trust readiness. You'll learn how to pinpoint critical security gaps in key areas like identity, devices, and networks, generating an easy-to-read dashboard that highlights their biggest risks.

Threat Hunting at Scale: How Securonix + ThreatQ Turn Intelligence into Action

Discover how Securonix and ThreatQ empower security teams to overcome alert fatigue, reduce manual workloads, and proactively hunt for threats at scale. In this session, experts from Securonix and ThreatQ demonstrate how combining advanced behavioral analytics with context-rich threat intelligence helps SOC teams detect stealthy attack chains, automate investigations, and respond faster. You’ll learn.