Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Future of Defence Report: IT Security Leadership in an Era of Unprecedented Cyber Threats

Based on insights from Keeper Security's Future of Defence Report, this talk reveals what over 1,000 IT professionals are seeing in today’s evolving cyber threat landscape. From AI-powered attacks and cloud jacking to memory-based exploits, modern threats are outpacing traditional defenses. Learn why conventional layered security is no longer enough, and how organizations must adopt a privileged access approach with strong authentication, authorization and encryption across every user and device.

How to implement CPS 234: A 7-step compliance guide

In 2024, Vanta’s State of Trust Report found that cybersecurity threats were the number one concern for Australian organisations. To mitigate such threats, the Australian Prudential Regulatory Authority (APRA) developed CPS 234—a robust security framework that all APRA-regulated entities must implement. ‍ CPS 234 addresses virtually all aspects of an entity’s security infrastructure, so implementation can be challenging without guidance.

CrowdStrike Named a Strong Performer in Forrester Wave for Unified Vulnerability Management

CrowdStrike is proud to be named a Strong Performer in The Forrester Wave: Unified Vulnerability Management Solutions, Q3 2025. We believe this recognition underscores the strength of CrowdStrike’s vision, the pace of our innovation, and the rapid adoption of CrowdStrike Falcon Exposure Management by customers transforming their vulnerability management, just 24 months after its launch.

CrowdStrike Detects and Blocks Widespread SharePoint Zero-Day Exploitation

Beginning on July 18, 2025, at approximately 0700 UTC, CrowdStrike Falcon Complete Next-Gen MDR and CrowdStrike Falcon Adversary OverWatch identified a wave of Microsoft SharePoint exploitation attempts by an unknown adversary. Two distinct zero-day vulnerabilities were made publicly available: a critical remote code execution vulnerability (CVE-2025-53770) and a server spoofing vulnerability (CVE-2025-53771).

Falcon Cloud Security - Accelerate Cloud investigations powered by Charlotte AI

Charlotte AI automatically triages detections with supporting evidence, autonomously generates and answers prioritized questions, and embeds AI reasoning directly into workflow automation to drive scalable action across cloud environments. Subscribe and Stay Updated:► Don't miss out on more exciting content! Subscribe to our channel for the latest updates, case studies, and more from the world of cybersecurity. Hit the bell icon to receive notifications whenever we post new videos. Thank you for watching!

What's New in CyCognito: July 2025 Platform Enhancements

Visibility without control is only half the battle. To truly stay ahead of attackers, security teams need precise access, trusted data, and efficient workflows they can rely on. That’s why we’re continuing to enhance the CyCognito platform with features that improve transparency, streamline operations, and put more power in your hands.