Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Fail-Open Architecture for Secure Inline Protection on Azure

Every inline deployment introduces a tradeoff: enhanced inspection versus increased risk of downtime. Inline protection is important, especially for APIs, which are now the most targeted attack surface, but so is consistent uptime and performance. This is where a fail-open architecture comes in.

Breaking Free from Legacy DLP - A Fireside Chat with Zebra Technologies

In this candid fireside chat, we’ll explore why legacy DLP is no longer fit for purpose and what a modern, behavior-aware approach looks like. Join us as we unpack the technical and cultural debt holding security teams back, how new paradigms like contextual visibility and real-time decisioning are enabling faster, more effective responses. Matt Webb, Sr. Manager of Information Security at Zebra Technologies, shares his first-hand experience of making the switch to modern DLP with Cyberhaven.

Security Automation: Sleep Better Tonight! #podcast #cybersecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Autonomous Vulnerability Remediation: Securing Web & API Apps Instantly

One-third of critical and high vulnerabilities remain open for 180+ days from the time they are discovered. When it comes to business growth vs security, business always wins by prioritizing features over vulnerabilities. This gives hackers enough time to exploit the vulnerabilities, putting the organization at risk. However, most of these vulnerabilities can be virtually patched within a few hours using solutions like AppTrana's SwyftComply, with zero impact on business continuity.

Beyond The Click: Unveiling Fake CAPTCHA Campaigns

Social engineering attacks continue to be among the most effective methods for delivering malware and compromising systems. Among these, a concerning trend has emerged and rapidly gained traction: "ClickFix" and "FakeCAPTCHA" campaigns. These sophisticated attacks exploit users' familiarity with everyday verification systems while leveraging clipboard manipulation techniques to deliver malicious payloads—all without exploiting a single technical vulnerability.

Identity Based Attacks: Why You Need Behavioral Detection in XDR

You’ve likely invested in traditional security tools that monitor failed logins or privilege requests—but more advanced threats use legitimate credentials to hide. If attackers bypass authentication protocols or hijack stolen tokens, they can roam freely under the radar. That’s why behavioral detection in an XDR solution is crucial. It does not just look at logs — it looks at patterns.

Fireside Chat: Breaking Free from Legacy DLP

There’s a silent frustration building inside security teams today. It’s the fatigue of defending critical data with tools that can’t keep up. The friction of investigating endless false positives. The anxiety of not knowing what sensitive data is actually doing across your environment. And the sinking realization that despite massive investments, DLP tools are failing at the one thing they were designed to do–prevent data loss.

How AI is Redefining SOC Architecture

If you’ve been in cybersecurity longer than five minutes, you know one thing: legacy SOC architecture isn’t just showing its age — it’s creaking under the weight of today’s threats. Cybersecurity analyst Francis Odum nailed it when presenting at Torq’s SKO 2025: “Legacy SOAR assumed everything starts in the SIEM. Now, teams connect automation directly to EDR, email, and identity systems.”.

AI-Powered Email Threat Detection and Response with Next-Gen SIEM

Email remains the top attack vector, and speed is critical when every second counts. Falcon Next-Gen SIEM and Fusion SOAR streamline detection by ingesting email telemetry and automating investigation with Charlotte AI. By analyzing sender behavior and message content, Charlotte AI delivers real-time, human-readable verdicts with confidence scoring. Teams can quickly isolate threats, block senders, or escalate suspicious activity. With AI-powered workflows and automation, email triage becomes faster, more precise, and scalable.