Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

GitGuardian MCP Sever - Example Use Cases and Installation

In this video, learn how to set up and use GitGuardian’s new MCP (Model Context Protocol) server to bring secrets security and Non-Human Identity (NHI) governance directly into your AI-powered IDE, like Cursor or Claude Desktop. GitGuardian Developer Advocate Dwayne McDaniel shows how to install the MCP server and run real use cases—like scanning for secrets, listing incidents, and creating honeytokens—all from inside your coding environment. Ready to embed security where code is written?

China's Cyber Strategy Exposed

Chinese cyber operations aren’t random hacks; they are part of a broader geopolitical competition for information, economic advantage, and strategic influence. Every operation ties back to China’s long-term national objectives. Mei Danowski, Co-Founder of Natto Thoughts Online Publication, explains how these attacks serve national objectives and why cybersecurity defenders must adapt.

Connecting Claude AI to LimaCharlie #ai #cybersecurity

Traditional AI integrations force you to choose between convenience and control. Our approach gives you both. LimaCharlie's MCP server makes connecting AI agents to your security infrastructure both simple and secure. The Process: Generate API keys with precise permissions One command connects Claude Code to your org Query live security data with natural language Key Features: The result: AI agents that work within your security boundaries while providing instant access to live infrastructure data.

Inside the Adversary's Mind: How Cloudflare's Red Team Hacks to Defend

Get a behind-the-scenes look at Cloudflare’s Red Team with Dan Jones — a Senior Security Engineer who thinks like an attacker to strengthen defenses. In this preview of his Cloudflare Connect 2025 talk, Dan shares how offensive security helps protect millions of Internet properties.

A10's ThreatX: API & Application Protection at the Edge

A10's ThreatX: API & Application Protection at the Edge A10's Carlo Alpuerto discusses how ThreatX provides comprehensive protection for APIs and applications at the edge. He explains that while the company offers a SaaS-first approach, the solution can be deployed on-premise, on a physical server, or in virtualized and cloud environments like AWS, Azure, and GCP.

Stop Password Sharing & Identify Security Breaches!

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

How API Abuse Can Drain Your Budget Fast? #ratelimiting #api #apisecurity

API abuse isn’t just a security risk it can hit your bottom line. In this clip, Wallarm and Oracle experts explain how attackers and even legitimate users can trigger costly API calls, drive up cloud bills, or abuse third-party integrations. Learn why monitoring, rate limiting, and cost controls are critical to protecting both your security and your budget.