Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Microsoft Copilot and Data Security: Tracing AI's Role in the Enterprise

Artificial intelligence is no longer a distant vision—it’s a present-day force reshaping how enterprises manage, process, and secure their data. Among the most influential innovations driving this transformation is Microsoft Copilot. Marketed as an AI-powered productivity enhancer, Copilot integrates seamlessly with Microsoft 365 applications, unlocking new levels of efficiency across industries.

The Future of Content and AI: Pay per Crawl and What's Next

In this episode, host João Tomé is joined by Will Allen, Cloudflare’s VP of Product Management, to discuss Pay-Per-Crawl and our new permission-based model for AI bots. These updates, launched on Content Independence Day, aim to reshape how AI models access and reward content, shifting from opt-out to opt-in. They explore how AI Overviews are changing the old “traffic for content” model, and how Cloudflare is helping creators take control through tools like AI Audit. Plus: the future of trustworthy content, bot authentication, and the rise of a fairer content economy.

XDR vs. SIEM: Defeating Cyber Chaos

Cybersecurity decision-makers face a growing challenge: defending against a rising tide of threats without drowning in operational complexity. Designed for large security teams, SIEM platforms often introduce more chaos than clarity, burdening small teams with high costs, complex deployments, and overwhelming data. In this webinar, Stephen Helm and Ricardo Arroyo will discuss the core differences between SIEM and XDR (Extended Detection and Response) and explain why XDR is emerging as the smart, scalable choice for modern MSPs and lean IT security teams.

An Enterprise Security Strategy That Turns SecOps Into Heroes

The tension between security teams and developers is palpable. Developers are considered impatient risk-takers, while SecOps folks are barely tolerated as a hindrance to adopting new tools and workflows. Weekly sprints, tight deadlines, and looming security threats (especially in the GenAI and vibe coding era) exacerbate this tension.

Microsoft Retires PowerShell 2.0 in Windows 11

The move to remove PowerShell 2.0 from Windows 11 is strategic and long overdue. Microsoft is making this move to embrace modern, secure, and efficient system tools. PowerShell 2.0 has many inherent security issues tied to the deprecated framework and its reliance on deprecated encryption & validation protocols.

The 4-Step Cybersecurity Risk Management Process

You are the CISO of a mid-sized enterprise that is experiencing rapid growth, i.e., your security stack is becoming increasingly complex by the month, compliance auditors are asking more challenging questions, and your board wants measurable proof that security investments are actually reducing risk. Meanwhile, attack vectors are evolving daily, and your current risk assessments consistently lag behind.

Exploiting Public APP_KEY Leaks to Achieve RCE in Hundreds of Laravel Applications

Laravel APP_KEY leaks enable RCE via deserialization attacks. Collaboration with Synacktiv scaled findings to 600 vulnerable applications using 260K exposed keys from GitHub. Analysis reveals 35% of exposures coincide with other critical secrets including database, cloud tokens, and API credentials.

Navigating Identity and Security in the Age of Agentic AI

As AI agents rapidly improve, becoming more autonomous and interconnected, they unlock new ways to assist us. But as they perform actions for us and delegate tasks to other AI agents, we need to reexamine our understanding of “identity.” How do we ensure these powerful AI interactions are authentic, authorized, and permissioned, while differentiating between legitimate actions and potential misuse?Join Datadog co-founder and CTO Alexis Lê-Quôc and Okta CTO Bhawna Singh as they explore the convergence of AI, security, and observability.

The Growing Supply-Chain Threat

Cyberattacks on supply chains in 2025 have become more frequent and severe, moving from isolated incidents to major multi-sector crises. These crises involve data theft in software patches, ransomware disrupting food, pharmaceutical, and financial pipelines. As attackers target vendors as entry points, defensive measures must adapt. This includes enhanced vendor vetting, code provenance controls, firmware security, and robust third-party risk response.