Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is SIEM migration and how can AI automate the transfer?

Understand what SIEM migration involves and how AI can automate rule conversion, data transfer, and validation processes. Learn how AI reduces migration time while maintaining accuracy and security. Additional Resources: About Elastic Elastic, the Search AI Company, enables everyone to find the answers they need in real time, using all their data, at scale. Elastic’s solutions for search, observability, and security are built on the Elastic Search AI Platform — the development platform used by thousands of companies, including more than 50% of the Fortune 500.

When Detection Isn't Enough: Limits of Microsoft Defender

Many MSPs rely on Microsoft Defender as a starting point for protecting customer environments. It’s built in, familiar, and good at generating alerts. But modern attacks don’t stop when an alert appears. They often use stolen credentials, legitimate tools, and cloud access to move quickly after detection. In this session, WatchGuard’s Worldwide MDR Channel Sales Manager Jen Rose will look at how attacks unfold in Microsoft Defender environments and why detection alone leaves gaps for MSPs and their customers.

Cybersecurity Is No Longer Just the CISO's Responsibility; It's Everyone's

In Episode of Guardians of the Enterprise, Ashish Tandon, Founder & CEO, Indusface, spoke with Madhur Joshi, CISO at HDB Financial Services (part of the HDFC Group), about building a security-first culture across the organization. They discussed how cybersecurity is no longer limited to IT, and why embedding security into every business function is critical. Watch this video to learn how HDB Financial Services has made cyber security a shared responsibility across teams.

EP 26 - The tyranny of the now: identity at machine speed

Security teams are under more pressure than ever, reacting at human speed while systems, identities, and AI agents operate at machine speed. In this episode of Security Matters, host David Puner sits down with cybersecurity leader and former FBI executive MK Palmore to explore why defenders struggle to keep pace and what it takes to regain control.

Access Your OpenClaw Web UI from Anywhere with Teleport

OpenClaw’s web UI gives you full control over your personal AI agent, but exposing it publicly creates significant risk. In this video, I show how to securely access the OpenClaw web interface from anywhere using Teleport, without opening inbound ports or relying on public instances. You’ll see how to put the OpenClaw UI behind identity-based access, approve devices, and keep full admin control while staying locked down.