Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Modern SecOps: What an AI-ready SOC actually means with Anton Chuvakin

Defender Fridays - Modern SecOps: What an AI-Ready SOC Actually Means with Dr. Anton Chuvakin Join us for this week's Defender Fridays as we explore what it actually means to build an AI-ready SOC with Dr. Anton Chuvakin, Security Advisor at the Office of the CISO for Google Cloud. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

How Tines helps organizations align with the EU Artificial Intelligence Act

The EU Artificial Intelligence Act (AI Act) introduces the world’s first comprehensive regulatory framework for artificial intelligence. It defines clear rules for how AI systems are built, deployed, and monitored, focusing on risk management, data governance, transparency, and accountability. Any organization offering AI-powered products or services to EU users (or processing EU data) must comply.

Calico Whisker in Action: Reading and Understanding Policy Traces

Kubernetes adoption is growing, and managing secure and efficient network communication is becoming increasingly complex. With this growth, organizations need to enforce network policies with greater precision and care. However, implementing these policies without disrupting operations can be challenging. That’s where Calico Whisker comes in. It helps teams implement network policies that follow the principle of least privilege, ensuring workloads communicate only as intended.

UNC6384 Weaponizes ZDI-CAN-25373 Vulnerability to Deploy PlugX Against Hungarian and Belgian Diplomatic Entities

Threat Actor Name: UNC6384 Targeted Industries: Government, Diplomatic Services Geographic Focus: Hungary, Belgium, Serbia, Italy, Netherlands (broader European diplomatic community)

How to Make Payment Forms PCI Compliant and Secure Against Formjacking Under PCI DSS 4.0.1

Formjacking involves malicious code injected into payment forms that captures credit card data during transactions. The form functions normally, the payment completes, and nothing unusual appears in server logs. This happens in the browser, outside the reach of traditional server-side security controls. PCI DSS 4.0 requirements 6.4.3 and 11.6.1 extend compliance to the client side to address this.

A Guide to Cloudflare Load Balancing Setup (Step-by-Step Walkthrough)

Setting up Cloudflare Load Balancing (LB) made easy! In this in-depth tutorial, we walk you through the essential pre-activation steps for Cloudflare Load Balancing. From understanding the core concepts to configuring your initial pools and health checks, this video covers everything you need to know to get started. If you're looking to improve your website's uptime, latency, and availability, this is the place to start.

Introducing Seemplicity's AI Agents for Exposure Management: A New Era of Action

Security teams don’t struggle to find exposures – they struggle to fix them. The new Seemplicity AI Agents change that. Integrated into the Exposure Action Platform, they combine intelligence and automation to help teams move faster, stay aligned, and reduce risk. From clear findings and ownership mapping to guided fixes and executive insights, Seemplicity’s AI Agents make exposure management truly action-driven.

Protecting the Systems that Sustain Us: Securing Critical Infrastructure During Cybersecurity Awareness Month

To close out Trustwave’s, A LevelBlue Company, Cybersecurity Awareness Month 2025 coverage, we will take a look at securing critical infrastructure, one of the focus areas for the Cybersecurity and Infrastructure Security Agency (CISA). For our complete coverage, please see: Cybersecurity Awareness Month 2025: The Value of MSSPs and Cybersecurity Awareness Month 2025: 4 Steps to Build a Cyber Strong America.