Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Fool Me Once: How Cybercriminals Perfected Deception | LevelBlue Threat Trends Report (Ed. 2)

Originally recorded in 2025, we look back at how cybercriminals perfected deception during the first half of the year. Now available as an archive recording, the session highlights the second edition of the LevelBlue Threat Trends Report and explores real-world incident data, fast-moving attack chains, and the social engineering techniques that shaped the threat landscape at the time. While the data reflects early 2025, many of the lessons remain relevant for understanding how today’s threat environment evolved.

Fast, Secure, Resilient: Modernizing Application Security at Scale

Software release cycles are now too fast for traditional security tools. Rapid iterations and reliance on open-source and cloud-native tech increase vulnerabilities, challenging AppSec teams to keep up. Attackers are taking advantage, targeting applications and exploiting misconfigurations, excessive permissions, and vulnerable plug-ins.

Why You Cannot Run Business Like A Government

Geopolitics runs on the idea that if one country is not first, another will be, and that logic is now leaking into corporate strategy. Nation states can absorb failure in pursuit of an edge, but most businesses have a low tolerance for failure, so importing that mindset turns ambitious bets into existential risks.

Effortless Data Security: From Discovery to Enforcement on a Single Platform

For years, data security has been divided into artificial categories. Data Loss Prevention (DLP) focused on enforcement. Data Security Posture Management (DSPM) focused on discovery. Insider risk management lived somewhere adjacent. And now, AI security has arrived as yet another bolt-on.

CMMC Enclave Strategy vs Full Environment Compliance

With any security framework, be it ISO 27001, FedRAMP, or CMMC, the goal is not to secure “your business.” It’s to secure sensitive and controlled information that your business handles. This is a fundamentally important way of looking at your security. Why does this matter? It’s all about borders. Where do you draw the line between what you keep secure and what you don’t care about?

Nightfall Forensic Search Demo: Complete Insider Risk Investigation in Minutes

See how security teams reconstruct insider risk investigations with Nightfall's new Forensic Search feature, going beyond policy alerts to uncover the complete story behind every potential threat. In this 15-minute demo, watch three real-world investigation scenarios: Departing engineer exfiltrating code to personal cloud storage Sales associate moving customer data to USB devices CFO accidentally using shadow IT with sensitive financial data.

Agentic Data Classification: A New Architecture for Modern Data Protection

In the evolving landscape of data protection and compliance, data classification is the bedrock of safe AI workflows. Yet legacy approaches rely on singular models that are fixed, rigid, and limited in context. Our agentic data classification approach reshapes this paradigm by not relying on any single model. Instead, we orchestrate a dynamic, intelligent layer that automatically selects the right model for the job.

CVE-2026-24858: Fortinet Multiple Products Authentication Bypass Zero-Day Analysis

CVE-2026-24858 is a critical authentication bypass vulnerability(CWE-288: Authentication Bypass Using an Alternate Path or Channel) in Fortinet products. It affects FortiOS, FortiAnalyzer, FortiManager, and potentially FortiProxy. An attacker with a FortiCloud account and registered device can log into devices registered to other accounts if FortiCloud SSO is enabled. Disclosed January 27, 2026, as actively exploited zero-day. CVSS 9.4 (some sources cite 9.8).