Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Your Digital Footprint and Why it Matters!

You know that trail of bread crumbs you leave across the internet? Cybercriminals love to eat them up! Every post. Every like. Every old username from 2012, it all sticks around. And scammers can use that info to guess passwords, target you, or piece together your whole life story. So post smart. Share less. Protect more.

Logs & Lattes Episode 4: How 2025 Reshaped SOCs and What Matters in 2026

Security teams spent 2025 operating at maximum load. Alert volume kept rising, analysts pivoted across too many tools, AI arrived faster than governance could support, and cloud costs shaped what data teams felt safe keeping. In this episode of Logs and Lattes, host Palmer Wallace and Jeff Darrington break down what actually happened inside real SOCs and how those lessons are already guiding 2026.

CISO Workshop on API Threat Modeling: How to Use STRIDE to Predict, Prevent, and Protect

Threat modeling is a critical function for effective cybersecurity and threat models must adapt to emerging threats. As API deployments grow across organizations, cybersecurity teams need to extend their threat modeling to include the API attack surface. In this webinar, we'll examine threat modeling best practices for APIs, focusing on the STRIDE methodology. Attendees will learn.

Malware Analysis - 2025 MITRE ATT&CK Enterprise Evaluations

The 2025 MITRE ATT&CK Enterprise Evaluations challenged defenders with sophisticated malware analysis scenarios, and CrowdStrike delivered 100% detection and protection with zero false positives. Traditional malware analysis takes hours or days, but modern threats like Mustang Panda require instant answers: What does this file do? What family does it belong to?

CVE-2025-66516: Critical XXE Vulnerability Exposes Apache Tika Deployments

A critical XXE vulnerability, CVE-2025-66516, has been discovered in Apache Tika, putting any workflow that processes PDFs at serious risk. A malicious PDF can trigger the exploit through any Tika workflow, silently giving attackers access to sensitive files, internal URLs, cloud metadata, and your internal network. AppTrana blocks these malicious PDFs at the edge, keeping your data and internal systems secure.

How Insurity Cut Manual Security Work by 81%

95 hours back. Every. Single. Month. One of the many outcomes from our ZTA journey with Insurity. They didn’t just deploy Zero Trust — they operationalized it. Reach unified controls, automated remediation, and eliminated the manual effort slowing progress. Results:︎ 81% less manual work︎ 95 hours saved per employee per month︎ Months → days for rollout︎ Zero Trust that sticks.

How to Configure and Manage miniOrange 2FA for Bitbucket | Admin & User Setup

This tutorial provides a complete walkthrough of configuring and managing Two-Factor Authentication (2FA) in the miniOrange 2FA app for Bitbucket. Learn how admins can enable and enforce 2FA methods across users and groups, and see how end users complete their 2FA setup during login. Strengthen your Bitbucket security with an additional authentication layer and protect your instance from unauthorized access.

AI, Creators & Agentic Commerce - A Conversation with Cloudflare CSO Stephanie Cohen

In this episode of This Week in NET, host João Tomé sits down with Stephanie Cohen, Cloudflare’s Chief Strategy Officer, for a candid conversation about AI, content creators, financial services, partnerships, and the future of the Internet. Stephanie shares how Cloudflare is helping keep the Internet open and resilient — from giving creators transparency and control over AI scraping, to enabling new models of agentic commerce through partnerships with Visa and Mastercard, to empowering organizations of all sizes through Cloudflare’s global network.