Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Human Factor: Don't Let Your Identity Become App-Rehended

*Catch Lookout's On-Demand Session from Black Hat 2025!* Your digital identity is the crown jewel, and adversaries are bypassing traditional network and EDR defenses by weaponizing the human element. The modern kill chain has evolved, exploiting our most ubiquitous and often least-secured endpoints: mobile devices. This isn't theoretical; it's the operational reality for sophisticated threat actors.

Safeguard: Using the double-edged sword of AI for good

Examine the function of AI in security tools, and how this double-edged sword can be used for good or ill in the cybersecurity sphere. Plus, see its integration into an identity fabric and get a glimpse into its responsible use – paired with the human element – in One Identity Safeguard.

Hunting the Unknown: How AI-Powered Analytics Are Redefining Cyber Threat Detection

Cybersecurity is in an arms race — attackers are using AI to launch deepfake fraud, polymorphic malware, and insider-driven threats at scale. But AI is also rewriting the rules for defenders. In this webinar, Sheik Abideen (Regional Sales Director, MEA) and Zubair Mukhtar Chowgale (Manager, Sales Engineering, APMEA) reveal how Securonix Unified Defense SIEM powered by Agentic AI helps overwhelmed SOC teams transform into proactive threat hunters.

How Cyberattacks Drive Customers Away (and Damage Trust)

A data breach doesn’t just cost money — it costs customers. Trust is hard to win and easy to lose, and cyberattacks often push loyal customers to walk away. In this short video, we explore how cyber incidents lead to customer churn, the hidden cost of lost trust, and why protecting sensitive data is critical to retaining your customer base. Watch now to learn: How cyberattacks impact customer trust and loyalty.

The Data Volume & Visibility Crisis in Cybersecurity

Enterprises are drowning in data — and struggling to see what really matters. The explosion of data volume has created a visibility crisis that makes it harder than ever to protect sensitive information and stop insider threats. In this short video, we explain why traditional tools can’t keep up, what makes visibility so critical, and how organizations can regain control over their data. Watch now to learn.