Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

2025 Trends in IoT Device Identity and Access Management (IAM)

As the number of IoT devices and connected devices continues to surge, IoT security has become a critical component of the modern IoT ecosystem. Ensuring the confidentiality, integrity, and availability of data across IoT networks is essential to protect against cyber threats and data breaches. With billions of devices now connected to the internet, the attack surface for malicious actors has expanded dramatically, making robust security measures more important than ever.

Trustwave SpiderLabs' 2025 Risk Radar Report: Technology Sector

Threat actors know that technology makes the world go round, and these adversaries are more than willing to use every cyber weapon at their disposal to take advantage of that fact, according to Trustwave SpiderLabs’ 2025 Trustwave Risk Radar Report: Technology Sector.

A Real Example of Copilot Exposing Sensitive Data

Is Microsoft Copilot putting your sensitive data at risk? AI tools like Copilot can unintentionally expose sensitive information through indirect queries leading to data leaks, insider threats, and compliance risks. In this webinar, we break down real-world examples of how over-permissioned access and prompt manipulation can bypass security controls and what you can do to prevent it. Stay ahead of AI-driven threats.

Why AI scam protection is more important than ever

Online scams are getting smarter—and harder to detect. Learn why AI-powered protection is essential in 2025, and how Avast Scam Guardian helps keep you safe from phishing, fake sites, and fraud—free for everyone. In a world where technology keeps us connected, informed, and entertained, it also creates new opportunities for scammers to sneak into our digital lives.

Falcon Exposure Management's AI-Powered Risk Prioritization Shows Organizations What to Fix First

As the attack surface expands and the number of vulnerabilities grows, organizations face a new crisis: how to prioritize which vulnerabilities to fix first based on their level of risk. CrowdStrike Falcon Exposure Management addresses this challenge with new AI-powered capabilities to help defenders identify what matters most and take action with precision. New innovations include AI-powered Asset Criticality, Client-Side Attack Path Analysis, and a CrowdStrike Falcon Next-Gen SIEM integration.

NGINX Integration: How to install nginx and instrument it to observe API traffic

In this step-by-step tutorial, we walk you through the complete process of installing NGINX and instrumenting it to monitor and observe API traffic. Whether you're just getting started or looking to improve your observability stack, this guide will help you set up NGINX for effective traffic monitoring. In this video you'll learn: Why is this important? Observing API traffic helps you detect issues early, optimize performance, and ensure your services are running smoothly.

AI Agent action - Task or Chat?

AI Agents give you the power to do so much, reducing friction between your team and other departments without adding to your team’s workload. So where do you start? The first thing to decide is whether you want to use a task or chat. This video explains when you should use a task, and when chat is better suited to your story. New to Tines? Sign up for our always-free Community Edition and start building right away.

Introducing the AI Agent action

Today, we’re announcing a way to build and deploy agents in Tines through our AI Agent action. In the AI market, AI agents suddenly seem to be everywhere – software that can autonomously think and perform tasks on behalf of the user. But we’re still very early in the adoption curve of agents. One thing we’ve noticed is that most solutions can’t handle the varying complexities of mission-critical workflows.

How AI-Powered Tools Are Revolutionizing Online Education security

Let's face it: the digital shift in education is permanent. Virtual classrooms, remote assignments, cloud-based exams-these are no longer futuristic concepts; they're the present-day norm. But while the benefits of flexibility and accessibility are undeniable, the vulnerabilities lurking beneath the surface are equally real. Imagine a scenario: a student logs into a popular education app from a public Wi-Fi network. That very act, innocent on the outside, can be a digital goldmine for cyber intruders if the platform lacks proper safeguards.