Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Patching without the pain: How Tines and Kandji simplify updates securely and at scale

Patching used to be routine. Now, it’s a race — with vulnerabilities, compliance demands, and constant updates pulling IT teams in every direction. For teams managing complex environments, especially those with a large Apple footprint, manual patching just can’t keep up. Join Kandji and Tines for a practical discussion on how top IT teams are using orchestration and automation to take control of patch management. You’ll learn how to reduce manual effort, minimize risk, and regain time for strategic work — all while keeping every endpoint secure and compliant.

Pen Testing: The "Aha" Moment That Changed Everything! #cybersecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

From Detection to Action: How Thomas Murray Transformed Their Incident Response with LimaCharlie

Join us for an exclusive behind-the-scenes look at how Thomas Murray, a global risk intelligence company, enhanced their security operations using LimaCharlie's SecOps Cloud Platform. In this technical deep dive, Thomas Murray's security expert Guillermo Roman, demonstrates how they've leveraged LimaCharlie's platform to enhance their security operations. By implementing custom automation workflows, Thomas Murray has achieved significant reductions in incident response times.

AI Agents Never Sleep. The Future of Cybersecurity SOC Operations

AI agents are revolutionizing cybersecurity by handling the tedious false positive alerts that drain SOC analysts. As our security perimeter expands to the cloud, we're drowning in red blinking lights - but AI agents never tire and never sleep! Grant Oviatt from Prophet Security explains how AI is solving the alert fatigue problem that's plaguing security teams worldwide. Key Points: AI agents handle repetitive security tasks False positive alerts are overwhelming analysts Cloud expansion = more security alerts AI works 24/7 without fatigue.

How Corelight Helped a Customer Reject a $10M Ransomware Demand

Corelight CEO Brian Dye shares the high-stakes story of a customer under a $10 million ransomware attack. The attackers claimed to have stolen sensitive IP—but with Corelight, the customer had the network visibility to verify exactly what was taken. The result? They confirmed the stolen data was limited and non-critical, enabling them to confidently deny the ransom demand. This powerful story illustrates the difference between “I think” and “I know”—and how that clarity can drive executive confidence, legal defensibility, and real-world savings.

Inside the SectorCERT Denmark Attack: How Corelight Helped Stop a Coordinated Campaign

Corelight CEO Brian Dye recounts how Corelight supported SectorCERT—an alliance of energy companies in Denmark—during one of the most advanced attack sequences he’s seen. The coordinated campaign targeted a shared firewall vulnerability across nearly a dozen organizations. Corelight provided the critical visibility and detection that helped defenders stop the first wave—and stay ahead of a second, modified attack just weeks later. The incident became a model of collaboration and response across national infrastructure.

Centrally process and govern your logs in Datadog before sending them to Microsoft Sentinel or Google SecOps

Organizations rely on best-in-class solutions for observability and security, and various teams within an organization often have preferences for different platforms. For example, your security team may use a SIEM platform like Microsoft Sentinel and Google Security Operations (SecOps) to detect and investigate threats, while your DevOps teams use Datadog Log Management for real-time troubleshooting and monitoring.

Securing Against Attacks: How WAF Rate Limiting Works

Rate limiting plays a major role in application security, especially when it is about defending web applications from malicious bot attacks, credential stuffing, brute force attacks and excessive API calls. Rate limiting security ensures that systems function properly without overwhelming them. It controls the number of requests a client or a specific IP address can send over a specified time period.

Web Application Firewall (WAF) Best Practices For Optimal Security

Web and mobile application code protection is a must-have security control. Modern solutions such as application layer firewall help your organisation to keep those assets protected from threats like SQL injection, cross-site scripting and bot-driven attacks. This is where a Web Application Firewall (WAF) comes into the picture. A WAF has the capability of filtering, monitoring and blocking HTTP requests to protect the assets from malicious requests without affecting legitimate users.

What is Privileged Access Management?

The management of user access to an organization’s assets, applications, and systems is never static. Users are coming and going, different roles require different access, and for some, privileged access – elevated permissions and access capabilities granted to specific users or groups of users — is needed for mission-critical business functions.