Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Tools That Help You View Difficult Content Safely

When your job involves looking at distressing or graphic material, there are ways to reduce the impact. Therapist Eve Parmiter shares practical tools and techniques – like muting audio, using blur overlays, or limiting your screen view – that help professionals stay regulated while still doing the work.#CyberSecurity.

Have we reached true anonymous AI? #cybersecurity #ai

PromptLock ransomware represents a chilling evolution: AI that makes real-time decisions about your data. Unlike traditional ransomware that blindly encrypts everything, this malware uses a locally-hosted LLM to analyze file contents and decide whether to exfiltrate or encrypt based on what it finds. It's essentially agentic AI making autonomous threat decisions.

Security Potpourri: SOCs, automation, and penetration testing with Cliff Janzen

Cliff Janzen, CISO and VP of Security Services at Arctiq, joined us for Defender Fridays for a special "Security Potpourri" session! What's on the menu? > SOC operations and optimization> Security automation strategies> Penetration testing insights> The current state of security landscape> All through Cliff's expert lens and real-world experience.

Outpost24 introduces new pen test reports and packages for mobile apps and APIs

Philadelphia, PA, 23rd September – Outpost24, a leading provider of exposure management solutions, today announced the launch of new pen test reporting, giving customers a consolidated view of all penetration testing results within a single platform. This eliminates the need to manage multiple reports from different sources, saving time and improving operational efficiency. Security teams can now view, schedule, and download reports directly, with actionable insights from certified pen testers.

CISO Spotlight: AJ Debole on the Business-Tech Divide, Breach Readiness, and AI Risks

AJ Debole is Field CISO at Oracle, but her journey began far from the corporate boardroom. After starting out in law and government, she moved into healthcare and cyber defense, where she led teams through ransomware crises. In this spotlight, she explores the next wave of challenges – aligning security with business incentives, taming AI sprawl, and securing the APIs that connect it all.

Enrich, Parse, and Control Logs with Observability Pipelines for Datadog Cloud SIEM

See how Datadog Observability Pipelines helps security and operations teams take control of their log data. In this demo, we’ll walk through: With Datadog, you can normalize, enrich, and prepare high-quality log data for Cloud SIEM, supporting faster investigations, more accurate detections, and reduced operational overhead—all without third-party software.

6 Steps to Counter Fourth-Party Supply Chain Vendor Attacks

Managing a cybersecurity program is hard, but also very meaningful, work. Continuously managing the cybersecurity posture of your organization’s supply chain vendors can at times feel near impossible, afterall ensuring the cybersecurity of your suppliers is an order of magnitude leap in difficulty. Yet, criminals are demonstrating that despite these difficulties, this task requires our immediate attention, given the trending success in exploiting our businesses' trusted relationships.