Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Deepfakes & Laptop Farms: Inside the 2026 Cloudflare Threat Report

In this episode of This Week in NET, host João Tomé is joined by Cloudflare threat intelligence experts Brian Carter and Chris Pacey to break down the 2026 Cloudflare Threat Report and what it reveals about today’s cyber threat landscape. We discuss how threat intelligence helps organizations prioritize risks, how attackers are increasingly leveraging automation and AI tools, and why botnets, supply-chain attacks, and credential-theft campaigns continue to evolve.

Beyond Human Scale: The Shift to Machine-Speed Defense

Modern threats move faster than humans can process. Join UpGuard CISO Phil Ross to discover how to replace manual bottlenecks with a machine-speed operating system for risk that orchestrates vendor, human, and attack surface defenses into one unified strategy. Interested in finding out more about UpGuard?

India's DPDP Act: One Mistake = 250 Crore Penalty? [Live Demo]

Is your organization actually ready for the Digital Personal Data Protection (DPDP) Act? One oversight in data handling can now lead to crore-level penalties. In our most-attended webinar to date, we break down the high-stakes reality of India's new privacy law. We don't just talk about the legalities—we show you the solution. Watch as we demonstrate our newly launched Privacy Tool designed to automate compliance and bridge the gap between IT security and data privacy. What you’ll learn: The "Single Mistake" that triggers maximum penalties. Why your current security stack isn't enough for DPDP. LIVE DEMO.

Let's Talk Security: Operationalizing Zero Trust

In this conversation, Forescout CEO Barry Mainz is joined by Dr. Chase Cunningham, also known as Dr. Zero Trust. Together, they will explore why Zero Trust feels harder than promised in real-world environments and what changes when you make Zero Trust universal (UZTNA): every connection, every asset, every environment.

Securing Endpoints With Keeper: Eliminating Local Admin Risk Without Slowing Users Down

Watch the recording of our exclusive webinar featuring Craig Lurey, CTO & Co-Founder of Keeper Security, and see how Keeper Endpoint Privilege Manager (EPM) removes standing admin privileges, enforces least-privilege access and blocks common attack paths, all while maintaining a seamless user experience.

Joomla SAML SSO with Salesforce | Step-by-Step SAML SP Setup Guide

Stop managing separate passwords! In this comprehensive tutorial, we’ll show you how to configure SAML Single Sign-On (SSO) for Joomla using Salesforce as your Identity Provider (IdP). By the end of this video, your users will be able to log in to your Joomla site securely using their Salesforce credentials, creating a frictionless enterprise experience.

Security Pricing That Actually Scales With Your Business #mssp #cybersecurity

Most vendors lock you into seat counts you'll never fully use. John Strand explains how LimaCharlie's flexible licensing lets Black Hills Information Security onboard and offboard endpoints without penalty, across SMBs and large enterprises alike.

AI SOC Automation with Explainable Results | Securonix Agentic Mesh

Securonix Agentic Mesh introduces productivity-based AI for the SOC. Meet SAM, the AI SOC Analyst built into the Unified Defense SIEM. Security operations teams are under more pressure than ever. Alert volumes continue to rise. Data is fragmented across hybrid and multi-cloud environments. Compliance demands are increasing. At the same time, adversaries are using AI to move faster and with greater precision.

Ep. 38 - The Evolution of Offensive Cybersecurity

"Hope is not a strategy." The roots of hacking go deeper than you think—all the way back to Bletchley Park and the first computers ever built. In the latest episode, Adrian Culley joins Tova Dvorin to trace the evolution of offensive security: from 1970s "phone freakers" to the sophisticated Breach & Attack Simulation (BAS) of today. The Insight: Penetration testing was a vital evolution, but it’s a "photo of a moving target." Modern resilience requires a "cyber training gym"—a continuous, automated sparring partner that validates your defenses against the latest TTPs 24/7/365.