Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI vs AI: Securing the Expanding Cyber Attack Surface | Mr. Anirban Mukherji at ET Studios

In this exclusive interview byte at ET Studios, Our Founder & CEO Mr. Anirban Mukherji discusses how increasing enterprise connectivity through cloud applications, third-party integrations, and remote work is exploding the enterprise cyber attack surface making identity security and access control more critical than ever. He dives into key threats like traditional ransomware, zero-day supply chain attacks, hyper-personalized AI phishing, and systemic incidents.

Segmentation Built for the Hybrid Reality

Traditional, IP‑based segmentation can’t keep up with today’s hybrid networks. In this video, learn why visibility, device identity, and risk context are essential to segmenting modern IT, OT, and IoT environments — and how Forescout is redefining segmentation for the way enterprises actually operate.

How SA Power Networks Accelerated Threat Detection with Exabeam

The small but mighty cyber security team at SA Power Networks, the sole electricity distributor for the state of South Australia, was challenged to keep up with numerous responsibilities, including preventive controls, patch management, and detect/respond functions. After choosing and implementing Exabeam, the platform has delivered the anticipated value: streamlining and accelerating the company’s TDIR function, strengthening security team bonds and collaboration, and cementing the critical link between security and business initiatives.

Exabeam: Real Intelligence. Real Security. Real Fast.

Security teams today face machine-speed threats, growing complexity, and overwhelming data. Exabeam helps you stay ahead with powerful AI, behavioral analytics, and automation designed to accelerate threat detection, investigation, and response (TDIR). With hyper-fast search, advanced analytics, and intelligent automation, Exabeam enables security teams to uncover threats faster, reduce manual work, and gain insights other tools miss. Since 2014, we’ve put AI and machine learning at the core of security operations—helping organizations modernize their SOC and improve outcomes at scale.

BewAIre: Detecting Malicious Pull Requests at Scale with LLMs

As AI coding assistants accelerate software development, the volume of pull requests at Datadog has grown to nearly 10,000 per week, increasing the risk that malicious changes slip through due to review fatigue. To address this, Datadog built BewAIre, an LLM-powered code review system designed to identify malicious source code changes introduced by threat actors. By reducing approval fatigue for developers while increasing friction for attackers, BewAIre guides human reviewers to the areas where judgment matters most, without slowing developer velocity.

Why Unified Management is a Game-Changer for Application Delivery

Why Unified Management is a Game-Changer for Application Delivery A10's Priyanka Mullan and Jamison Utter discuss the critical advantages of a unified management approach for modern application delivery. Managing complex networks doesn't mean juggling multiple solutions. Learn how a single code base simplifies the entire lifecycle. Key takeaways from this discussion.

Cybersecurity Analyst & Investigations Lead, Kristen Yang - The 443 Podcast - Episode 363

In this episode, Corey Nachreiner interviews WatchGuard Cybersecurity Analyst and Threat Emulation & Investigations Lead, Kristen Yang, about the path into cybersecurity, the evolution from threat hunting to leading investigations, and the realities of defending against modern attacks. They explore today’s threat landscape, incident response mistakes, red teaming lessons, MITRE ATT&CK, AI in security, and the skills analysts need most, plus a rapid-fire round to close things out.

Corelight Agentic Triage overview

Corelight is excited to introduce Agentic Triage! In this demo, you can see how Agentic Triage helps SOC analysts filter through alerts and respond quickly to active threats. We combine generative AI with our industry leading log framework to identify the detections and cases that truly matter. This video shows how you can use Agentic Triage to quickly perform deep dives into open detections and make confident decisions to secure your network.