Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The AI attack surface with Katherine McNamara

Join us for this week's Defender Fridays as Katherine McNamara, Cybersecurity Technical Solutions Architect at Cisco, breaks down the expanding attack surface of AI and ML systems and what organizations need to do to secure them before it's too late. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Beyond the Firewall: Growing Your MSP with NDR

A firewall is essential, but it’s no longer enough. Today’s attackers slip past perimeter controls, hide in encrypted traffic, and move fast once they get inside. Network Detection and Response (NDR) delivers always-on network visibility, earlier threat detection, and faster response, enabling you to see and stop what firewalls miss.

Why Too Dangerous to Release AI is a Lie

Calling a model too dangerous to release ignores the obvious reality that open and alternative models will soon reach similar capability. Once the path is visible, other providers, including overseas competitors, will build their own versions, so secrecy becomes a temporary market move, not a lasting safety strategy.

This AI Safety Move Makes Zero Sense #aisafety #ai #tech

Claiming an AI model is too dangerous for public release while issuing a press release about it creates more questions than trust. If something genuinely carries that level of risk, private handling under strict controls makes sense, but public hype only fuels suspicion, competition and panic.

How Cloudflare Got 2x Faster Servers With Less Cache

In this episode of This Week in NET, JQ Lau and Victor Hwang from our Network & Infrastructure Strategy team walk us through Cloudflare's 13th generation of servers — the machines that power a significant part of the internet across 330+ cities worldwide. The Gen 13 program doubled compute density by jumping from 96 to 192 cores, but that came with an 83% drop in L3 cache. The team explains how a bold hardware bet, combined with Cloudflare's FL2 Rust-based software rewrite, turned that trade-off into a win across throughput, latency, and power efficiency.

Turning Attackers into Signals: How Deception is Redefining Threat Detection | Fidelis Security

Traditional detection methods are struggling to keep up with modern threats. What if you could turn attackers into your strongest signal? In this session, our Sales Engineer Jim breaks down how deception technology is transforming cybersecurity by: Delivering high-fidelity alerts with minimal noise Adapting dynamically to attacker behavior Extending protection to IoT and non-standard devices Scaling seamlessly across enterprise environments.

OUT OF BAND | The Breaking Point: Inside Mythos' Zero-Day Machine with Anthropic's Nicholas Carlini

Nicole Perlroth sits down with Nicholas Carlini for an Out of Band conversation on the imminent zero-day surge. Carlini explains what Mythos can already do: find and exploit flaws in some of the world’s most hardened, widely deployed software—with minimal human input. He details what Mythos has already hacked, which now includes most of the operating systems in use.