Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

"AI is a massive power for good, but are we ready for it?"

AI is a powerful tool, but are we truly prepared for its impact? The balance between AI's benefits and the ethical concerns surrounding privacy, data security, and automation is more critical than ever. As technology advances, ensuring AI serves people—not the other way around—has become a global priority.

#196 - Security challenges in the Arctic with Deepak Dutt, Founder of Zighra

On this episode of The Cybersecurity Defenders Podcast, we talk about security issues in the Arctic with Deepak Dutt, Founder of Zighra. Deepak is a technology leader and entrepreneur on a mission to secure the future against AI-powered threats and to inspire founders to transform their ideas from zero to meaningful impact. Deepak’s career began in the software space, inspired by his father’s passion for technology. In his late teens, he founded his first company in the eLearning space, which he successfully led to an acquisition, relocating to Ottawa at the age of 21.

LimaCharlie Playbooks demo

LimaCharlie Playbooks expand the use of Python in the SecOps Cloud Platform (SCP), letting users reduce the learning curve for leveraging advanced capabilities in our platform. While the current format of our detection and response rules remain highly effective, our playbooks make much of the same functionality available to Python scripts. Playbooks also give users extreme control and granular functionality over certain operations that LCQL does not.

How to Defend Against Pass-the-Ticket Attacks: Stop PC Hacking Techniques in Active Directory

Discover how cybercriminals exploit the Pass-the-Ticket attack to breach critical systems—and learn how to defend against it! In this cybersecurity tutorial, Jon Obst, Director of R&D at Netwrix Corporation, demonstrates this advanced Active Directory hacking technique. See how attackers use PC hacking techniques to steal user tickets without passwords, enabling lateral movement, privilege escalation, and data theft.