Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Streamlining DevSecOps with ASPM | Seemplicity

How ASPM Improves DevSecOps Efficiency Is your DevSecOps process slowing you down instead of speeding you up? In this quick educational video, we break down how Application Security Posture Management (ASPM) helps DevSecOps teams cut through noise, streamline workflows, and fix what matters—without disrupting development velocity. You'll learn: The common pitfalls slowing down DevSecOps How ASPM centralizes findings and prioritizes real risks Ways ASPM automates remediation workflows What smarter, faster security looks like in practice.

PhaaS the Secrets: The Hidden Ties Between Tycoon2FA and Dadsec's Operations

Since September 2023, Trustwave’s Threat Intelligence Team has been tracking a large-scale phishing campaign distributed via email, attributed to "Storm-1575". Storm-1575 is known for developing and distributing a PhaaS platform with adversary-in-the-middle (AiTM) capabilities, known as "Dadsec". The team’s recent investigations have revealed that the infrastructure used by Dadsec is also connected to a new campaign leveraging the "Tycoon2FA" Phishing-as-a-Service (PhaaS) platform.

How the MOD can achieve decision superiority against cyber threats

AI as a force multiplier for cyber resilience in defence Military leaders are well-acquainted with the expansion of conventional warfare into digital battlefields. The recent attack and breach of a UK Ministry of Defence (MoD) supplier exposed data of 270,000 service personnel,1 representing not an isolated incident but a pattern in an escalating cyber conflict.

Tines' Field CISO Matt Muller on security's communications problem and the future of the SOC

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Matt Muller, Field CISO at Tines. With over a decade of experience at companies like Material Security, Coinbase, and Inflection, Matt’s got a strong track record of scaling SecOps teams, building threat detection and mitigation programs, and driving trust and safety initiatives. His knowledge impressed Thomas and the Tines team so much that they invited him to become the company's first Field CISO.

How Do You Safeguard AI When Development Outpaces Security? With Ante Gojsalić - SplxAI

Generative AI is moving faster than our defences — can we catch up? In this episode of Razorwire, host James Rees (aka Jim) speaks with Ante Gojsalić, CTO and co-founder of SplxAI, to dissect the growing risks, complexities, and opportunities in securing AI systems before they outpace our ability to protect them.

CrowdStrike Elevates XIoT Security with AI-Powered Insights

As organizations increasingly rely on connected devices to drive efficiency and innovation, the Extended Internet of Things (XIoT) — covering industrial control systems (ICS), operational technology (OT), Internet of Things (IoT), and Internet of Medical Things (IoMT) — has rapidly expanded. This greater connectivity often drives increased vulnerability as critical assets are exposed to sophisticated threats.

Catching Up on Cloud Attack Paths with Cloud Threat Specialist Sebastian Walla

Today’s adversaries are increasingly operating in the cloud — and Sebastian Walla, Deputy Manager of Emerging Threats at CrowdStrike, is watching them. In this episode, he joins Adam and Cristian to dive into the latest cloud attack techniques and the adversaries behind them.

Navigating FedRAMP Compliance: Why It's Crucial for Mobile Security

If your organization handles United States federal government data in cloud environments, it’s often a requirement to use FedRAMP-authorized solutions. The Federal Risk and Authorization Management Program (FedRAMP) provides consistent standards for protecting unclassified data that passes between the federal government and privately owned third parties.

Understanding Common Vulnerabilities and Exposures (CVEs) and Their Role in Deceptive Threat Detection

Cyber threats are becoming more advanced, with attackers creating ways to bypass traditional security. That’s why organizations need a stronger, multi-layered approach to protect their systems. To handle cyber threats effectively, security teams need clear, consistent information. That’s where CVEs help—by making it easier to manage hidden risks. And how can organizations enhance their cybersecurity capabilities with CVE data along with deception technology?

CISO Spotlight: Mike Wilkes on Building Resilience in an Evolving Threat Landscape

Mike Wilkes has had a career many cybersecurity professionals could only dream of. An adjunct professor, former CISO of Marvel and MLS, member of the World Economic Forum, drummer, and board member at the National Jazz Museum in Harlem, his interests and achievements are as eclectic as they are impressive.