Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Future of Content and AI: Pay per Crawl and What's Next

In this episode, host João Tomé is joined by Will Allen, Cloudflare’s VP of Product Management, to discuss Pay-Per-Crawl and our new permission-based model for AI bots. These updates, launched on Content Independence Day, aim to reshape how AI models access and reward content, shifting from opt-out to opt-in. They explore how AI Overviews are changing the old “traffic for content” model, and how Cloudflare is helping creators take control through tools like AI Audit. Plus: the future of trustworthy content, bot authentication, and the rise of a fairer content economy.

XDR vs. SIEM: Defeating Cyber Chaos

Cybersecurity decision-makers face a growing challenge: defending against a rising tide of threats without drowning in operational complexity. Designed for large security teams, SIEM platforms often introduce more chaos than clarity, burdening small teams with high costs, complex deployments, and overwhelming data. In this webinar, Stephen Helm and Ricardo Arroyo will discuss the core differences between SIEM and XDR (Extended Detection and Response) and explain why XDR is emerging as the smart, scalable choice for modern MSPs and lean IT security teams.

Navigating Identity and Security in the Age of Agentic AI

As AI agents rapidly improve, becoming more autonomous and interconnected, they unlock new ways to assist us. But as they perform actions for us and delegate tasks to other AI agents, we need to reexamine our understanding of “identity.” How do we ensure these powerful AI interactions are authentic, authorized, and permissioned, while differentiating between legitimate actions and potential misuse?Join Datadog co-founder and CTO Alexis Lê-Quôc and Okta CTO Bhawna Singh as they explore the convergence of AI, security, and observability.

Securing the Industrial Identity Fabric: Tackling Identity Risk in Global Manufacturing

As manufacturing environments become more interconnected and identity-driven, securing the industrial identity fabric is critical to operational resilience and cyber defense. In this 30-minute session, we explore why identity is now the new perimeter—especially in complex, hybrid OT/IT manufacturing ecosystems.

Human Risk Intelligence: Is Behavioural Data the New Defence?

Traditional security training doesn’t work. So how do we measure and manage the human element of cyber risk in a way that actually changes behaviour? In this episode of Razorwire, host James Rees speaks with Flavius Plesu, CEO of OutThink, to explore the evolution of human risk intelligence—a discipline using behavioural science and psychographic data to proactively reduce insider threats and strengthen organisational security from within.

Tanium Core Content - Fun stuff for everyone - Tanium Tech Talks #132

Tanium is like a big toy box with many fun experiences from day one. See some examples of core content that every customer gets. Sensors return data. Packages take action. Hundreds of cross-platform sensors and packages out-of-the-box Before creating new, check to see if one already exists Never edit core content; instead, clone with your own modifications Use a naming convention to distinguish your custom content Take the Custom Content course for more details.

Charlotte AI - Agentic Workflows: Vulnerability Impact Translation

Vulnerabilities pile up fast, but which ones truly matter to your business? With Charlotte AI Agentic Workflows, CrowdStrike turns overwhelming technical data into business-ready intelligence so you can prioritize what really counts. By pulling real-time vulnerability insights from Falcon Exposure Management, Charlotte AI evaluates what systems are at risk, how many users could be impacted, and what services or revenue streams are on the line. In this demo, you’ll see how AI-driven reasoning translates CVEs and severity scores into clear business impact, no manual analysis required.