Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Model Drift to API Exploitation: The Next Challenge in AI Security

From Model Drift to API Exploitation: The Next Challenge in AI Security In this clip from "Securing AI Part 4: The Rising Threat of Hidden Attacks in Multimodal AI," Diptanshu Purwar and Madhav Aggarwal summarize why external guardrails are the only sustainable defense against the new wave of AI exploitation. Jamison Utter then sets the stage for the next topic in the series: securing the fundamental protocols and APIs that AI agents rely on.

From Data Burden to Strategic Advantage: Rethinking SIEM Economics for the Modern SOC

Your security operations are running in full throttle. Every log, alert, and event is fuel for defense. But as enterprises scale across endpoints, cloud, and SaaS, data has become both an enabler and an expense. The explosion of telemetry has turned visibility into an economic dilemma. Across the industry, CISOs are confronting a simple truth: the challenge isn’t how much data you can collect; it’s how intelligently you can use it to stay both Breach Ready and Board Ready.

How to Prep Out-of-Band Communication for Incident Response with Navroop Mitter from ArmorText [266]

On this episode of The Cybersecurity Defenders Podcast we speak with Navroop Mitter, CEO of ArmorText, about the role of Out-of-Band (OOB) communication in cyber incident response. Navroop Mitter is the CEO of ArmorText, a mobile security and privacy company based in the Washington, D.C. area.

Warning: ClickFix Attacks are Growing More Sophisticated

Researchers at Push Security warn of an extremely convincing ClickFix attack posing as a Cloudflare verification check. ClickFix is a social engineering technique that tricks the victim into copying and pasting a malicious command, then running it on their computer. In the instance observed by Push Security, the phishing page has a pop-up box that appears to be from Cloudflare, instructing the user to press the keyboard shortcuts necessary to open a terminal and run a command.

Securing The Win Episode Four: Matt Cadieux

Whether at the factory, in transit, or during the 24 races globally, speed and security go hand in hand. In Episode 4 of Securing the Win, Matt Cadieux, CIO of Oracle Red Bull Racing, reveals how the team builds secure foundations that never compromise performance. From hybrid work to emerging technology, we explore how security, speed, and strong leadership fuel the team’s performance.

OWASP Top 10 Business Logic Abuse: What You Need to Know

Over the past few years, API security has gone from a relatively niche concern to a headline issue. A slew of high-profile breaches and compliance mandates like PCI DSS 4.0 have woken security teams up to the reality that APIs are the front door to their data, infrastructure, and revenue streams. OWASP recently published its first-ever Business Logic Abuse Top 10 List; a clear indication that the industry is taking API security and all its nuances seriously.

How to Build Effective & Affordable Cyber Defences for SMEs

How can small and medium businesses protect themselves from cyber threats without spending a fortune or just ticking boxes for compliance? Welcome to Razorwire, the podcast where we share our take on the world of cybersecurity with direct, practical advice for professionals and business owners alike. I’m Jim and in this episode, we’re taking a look into the challenges faced by SMEs on the journey through cybersecurity compliance and insurance.