Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI-powered attacks are getting more sophisticated.

AI-powered attacks are getting more sophisticated. However, AI-powered defense is evolving even faster. At Cloudflare, AI is already detecting and stopping threats faster than human researchers ever could. How? Machine learning models analyze millions of attack patterns in real-time, identifying anomalies and blocking threats before they spread. AI detects novel attack patterns before they even make headlines AI reduces false positives, helping security teams focus on real risks AI learns from past incidents, adapting faster than traditional security tools.

Random but Memorable - Episode 14.6: Security Agents Protecting Adolescence with Chris McCarty

This episode we meet Chris McCarty, the inspirational student and founder of Quit Clicking Kids, an organization advocating for children's rights in the digital age. Learn about the rise of “sharenting” and how Chris is fighting for legislative changes to safeguard minors from exploitation on social media platforms. We cover everything from the permanence of online content to getting Gen Z proactive about their privacy.

Access Requests, Approvals & Provisioning - All in Jira | Workflow for Jira by miniOrange

Streamline Access Requests & Provisioning with Workflow for Jira by miniOrange | Product Demo Tired of messy spreadsheets, email approvals, and manual provisioning? Say hello to Workflow for Jira by miniOrange — your all-in-one solution to automate Application Access & Governance directly within Jira Service Management.

Data Weaponization: How Cyber Attacks Impact the Vulnerable

Welcome to the Data Security Decoded podcast by Rubrik Zero Labs. In this episode, our host Caleb Tolin speaks with Pavlina Pavlova, a researcher and cybersecurity advocate focusing on data weaponization and its disproportionate impact on vulnerable populations. Pavlina defines data weaponization as using data to manipulate, deceive, coerce, or attack someone to inflict harm. Her research investigates why cyber attacks and their impacts often have gendered dimensions, with certain populations experiencing more severe consequences.

Defend from Adversaries in the Tradecraft Attacking the Cloud w/ CrowdStrike Falcon Cloud Security

CrowdStrike Falcon Cloud Security: ► Stop cloud breaches and consolidate disjointed point products with the world’s only CNAPP built on a unified agent and agentless approach to cloud security for complete visibility and protection.