Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Behavioral Analysis Drives Fast Reactions in Today's SOCs

The field of cybersecurity changes , and Security Operations Centers (SOCs) need to leave behind old signature-focused tools. SOCs now rely on behavioral threat detection and analysis to strengthen their systems. Using behavior-based methods to respond to threats is key to catching advanced attacks that slip past traditional defenses.

How Protecto Helps Healthcare AI Agents Avoid HIPAA Violations

Despite being one of the most highly regulated industries, healthcare businesses are disproportionately impacted by breaches. IBM’s independent research centre, Ponemon Institute’s report on the cost of a data breach, healthcare continues to top the list for 12 consecutive years. AI agents are infiltrating every sector, healthcare is no exception.

The ABCs of "ishing": From Phishing to Quishing

It’s no secret that in cybersecurity, many attacks begin with some form of “‑ishing.” But what exactly are these tactics and who’s behind them? From classic phishing emails to more advanced impersonation schemes using AI and social platforms, attackers continue to evolve their methods to exploit human behavior. Understanding the full spectrum of “‑ishing” techniques is critical for organizations looking to protect their people, data, and reputation.

Windows AppLocker - Tanium Enforce - Tanium Tech Talks #137

See how Tanium makes it easier to manage at scale across multiple environments. Tanium helps you reach and manage all of your traditional servers and workstations, and also those that are hard-to-reach: Older Windows versions VPN clients and work-from-home Stand-alone non-AD-domain-joined (like industrial environments) AD-domain-joined spanning multiple domains and forests.

AI Agents Vulnerabilities and Prompt #cybersecurity #aisecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Can ChatGPT Decode Exploit Data? You'll Be Surprised!

Can ChatGPT really make sense of exploit data? The answer is yes. In this clip, security expert Brian Johnson shows how ChatGPT decoded a hex-encoded payload and revealed the contents of a password file in seconds. Watch the full webinar to see how AI tools like ChatGPT are changing the penetration testing game.