Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI in Action: Transforming Cyber Defense Strategies with Agentic MDR

While various AI and machine learning automated workflows offer a great deal of insights into complex prediction and computation problems, recent advances in generative AI provide excellent summarization and content generation capabilities for a broad range of use cases. This means that search results are more comprehensive and accurate, often tailored to end-user needs. However, one remaining opportunity is to get the end-to-end job done with accuracy, speed and more importantly, agility.

Exabeam Launches the First Fully Integrated, Multi-Agent AI for Security Operations

Imagine a world-class chess grandmaster playing multiple opponents at once—anticipating moves, spotting patterns, and staying steps ahead of every competitor. Now, imagine if that grandmaster had an AI-powered assistant, constantly analyzing past games, predicting threats, and offering guidance in real time. That is what Exabeam is bringing to security operations.

Threat Investigations In 5 Minutes With Sysdig

Cloud attacks only take ten minutes, leaving a fraction of that time to investigate and initiate a response. Adversaries already have a head start. Cloud has changed the game and attacks are faster than ever. So to stand a chance, you need to move at cloud speed. Sysdig redefines Cloud Detection and Response by enabling five-minute investigations for even the most complex attacks - empowering our customers with rapid insights and comprehensive visibility across their cloud estates.

Azure Functions Integration: Secure Your Serverless APIs with Astra

Azure Functions provide a scalable and event-driven way to build serverless APIs, but securing them requires continuous monitoring and threat detection. By integrating Astra’s API Security Platform with Azure Functions, you can proactively identify vulnerabilities, monitor API traffic, and protect your serverless applications from real-world attacks.

Cloud Security in 2025 What CISOs Need to Prepare For with João Pedro Gonçalves and Michael Tremante

In this episode of The Connectivity Cloud Podcast with Cloudflare, host Mark Dembo is joined by João Pedro Gonçalves, CISO and Managing Director at EQT Group, and Michael Tremante, Senior Director of Product at Cloudflare. Together, they explore critical security trends for 2025, from AI-powered threats to regulatory changes to practical strategies for balancing protection with usability. What You’ll Learn.

One of the biggest cybersecurity myths out there?

One of the biggest cybersecurity myths out there? VPNs equal complete privacy. Here's what you need to know: A VPN hides your IP address, but it doesn't make you anonymous. Your VPN provider still has your data and logs and can hand them over if requested. Websites still track you through cookies, fingerprints, and browser activity. On the latest episode of The Connectivity Cloud Podcast, João Pedro Gonçalves and Michael Tremante break down why VPNs aren't the silver bullet they're marketed to be.

Cloudflare Bot Management Demo

Cloudflare applies a layered detection approach to Bot Management with several detection engines that cumulatively impact the bot score. Bot scores can be used in WAF rules to create granular security policies. This demo highlights how Cloudflare can help with several use cases including web scraping, account takeover, and AI bot protection. Additionally, Cloudflare's AI Assistant, Cloudy, is used to review additional bot analytics and create a WAF rule based on bot score and additional criteria.

Salt Security: Focused on Solving Real Business Problems

In today's digital landscape, APIs (Application Programming Interfaces) have become integral to business operations, enabling seamless integration and innovation. However, this increased reliance on APIs has also introduced significant security challenges. Salt Security offers a comprehensive solution to these challenges, providing organizations with the tools they need to protect their digital assets effectively.