Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Building human-centric SOCs in the age of AI automation with Alec Fenton

Defender Fridays - Building human-centric SOCs in the age of AI automation with Alec Fenton Join us for this week's Defender Fridays as we explore the evolution of security operations and AI's role in empowering analysts with Alec Fenton, VP Security Operations at Foresite Cybersecurity. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Adopting cold-war tactics for AI deep fakes?

The AI arms race in deepfake detection has a critical problem: the technology can't keep up. In this episode, Navroop Mitter, CEO of ArmorText, discusses why the industry is shifting away from relying on AI detection alone. A recent study from SKKU in South Korea found that zero out of sixteen top deepfake detection technologies could reliably identify deepfakes in real-world conditions. They worked fine in controlled lab settings, but failed when it mattered most.

Optimize Your Application Security with Custom WAF Rules

Your website is unique, and so are the attacks against it. Generic Web Application Firewall (WAF) rules protect everyone a little, but leave your site exposed to specialized attacks. Custom WAF rules are your line of defense against targeted threats—the ones tailored to your specific application, industry, or code base. Key Advantages of Custom WAF Rules.

Secure Your App with Mend.io's AI-Native AppSec Platform (featuring ByteGrad)

This video, originally created by Wesley from ByteGrad, walks through how to secure your applications using Mend.io’s AI-Native AppSec Platform — including SAST, SCA, and SBOM scanning. Wesley explores how Mend integrates with GitHub, automates code fixes, and helps developers stay ahead of vulnerabilities. Creator: ByteGrad YouTube Channel Timestamps.

How Aurora Endpoint Powers Outcome-Driven Security

See how Aurora Endpoint Defense uses predictive AI and behavioral detection to deliver powerful, outcome-driven endpoint protection. This demo highlights key features like alert triage, threat prevention, and automated response—all designed to simplify and strengthen your security posture.

Modernizing PCI DSS 4.0: From Compliance Burden to Competitive Advantage

PCI DSS 4.0 represents a significant change in how organizations and service providers approach compliance. It is more than an update to requirements. It is a philosophical shift that emphasizes continuous, risk-based security instead of point-in-time validation. In this joint session, LimaCharlie, ControlCase, and author Branden R. Williams explore how to navigate this new era of PCI compliance. Branden explains what has changed in PCI DSS 4.0, why those changes were made, and how they reflect a new mindset toward continuous assurance and flexibility.