Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Zero Trust for IoT: Best Practices for Secure Device Access

IoT security has become a top priority in today’s hyper-connected world, where billions of devices—from sensors and cameras to industrial controllers—are linked across diverse networks. As organizations deploy more IoT devices to drive innovation and efficiency, they also introduce new security challenges that traditional security models are ill-equipped to address.

Alpha AI: The Apex of SOC Intelligence

Arctic Wolf is redefining cybersecurity with AI-powered innovations that help businesses stay ahead of evolving threats. By combining human expertise, the power of the Aurora Platform, and one of the industry’s largest security data sets, Alpha AI makes security simpler, faster, and more effective. Watch Dan Schiappa, President of Technology and Services, and Ian McShane, Vice President of Product, as they share how Arctic Wolf’s latest AI advancements are helping more than 10,000 organizations make security work.

Is PAM Suitable for Small Businesses or Only for Large Enterprises?

Monitoring privileged access is crucial for organizations of all sizes, not just large enterprises. Privileged Access Management (PAM) refers to the security and management of privileged accounts, such as administrators or third-party vendors, that have access to sensitive data and systems. Although PAM is traditionally viewed as a solution for large enterprises, small businesses also benefit significantly from implementing PAM solutions, especially as they expand into hybrid and cloud environments.

From Cloud to AI: Innovation, Risk & Business Strategy #ai #podcast

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

June 16, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: BruteForce Attack Against Apache TomCat Manager GreyNoise recently observed a coordinated spike in malicious activity against Apache Tomcat Manager interfaces. On June 5, 2025, GreyNoise registered well above baseline volumes, indicating a deliberate attempt to identify and access exposed Tomcat services at scale.

Stopping Cloud Breaches at Machine Speed: How CrowdStrike Uses Agentic AI to Power Cloud Detection and Response

Cloud is the new battleground, and more adversaries are joining the fight: New and unattributed cloud intrusions were up 26% in 2024, according to the CrowdStrike 2025 Global Threat Report. As adversaries accelerate cloud attacks, CrowdStrike delivers full-cycle agentic AI — from detection triage to threat response — giving defenders the edge to act at machine speed before adversaries can break through.

Announcing a Dedicated Snyk API & Web Infrastructure Instance for Asia-Pacific

Snyk is delighted to announce a significant milestone for our customers and partners in the Asia-Pacific (APAC) region: the launch of a dedicated Snyk API & Web infrastructure instance, which is now available and hosted locally within the region. This investment addresses the critical needs of our growing customer base in the region, ensuring that they can benefit from our modern, developer-first DAST capabilities while meeting local data residency and compliance requirements.

#220 - AI & automation for security operations w/ Filip Stojkovski, Staff Security Engineer at Snyk

On this episode of the Cybersecurity Defenders Podcast we speak with Filip Stojkovski, Staff Security Engineer at Snyk. Filip is a cybersecurity professional with over 15 years of experience. He began his career as a SOC analyst and now leads SecOps engineering at Snyk. Filip also advises organizations on SOAR, AI for SOC, and threat intelligence strategies.