Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI on the Radar: Securing AI Driven Development

Join Vandana and Rob in this insightful webinar exploring the rapidly evolving landscape of AI security. As we shift from simple query-response models to complex autonomous agents that can plan, execute code, and access sensitive APIs, the traditional security "locks" are no longer sufficient. This session dives deep into the OWASP AI Exchange, a community-driven initiative providing practical guidance and technical controls for securing AI systems.

Cisco's SD-WAN 0-Day - The 443 Podcast - Episode 360

This week on the podcast, we discuss the recently disclosed and patched 0-Day vulnerability in Cisco's Catalyst SD-WAN Controller which has been under active exploit for 3 years. After that, we cover the latest open source supply chain attack involving a self-propagating worm targeting AI tools. We end with a discussion about another social engineering campaign targeting job hunters in the software development world.

Tech Talk | Print, Leak, Repeat: UEBA Insider Threats You Cant Ignore

Insider threats thrive in ambiguity. They exist in the space where everyday work and malicious intent overlap. Traditional defenses are not built to detect that overlap, they are built to stop outsiders, not to question the behavior of insiders who look legitimate until the moment they are not. User Entity and Behavior Analytics (UEBA) fills that gap by establishing a behavioral perimeter around every identity and device.

CrowdStrike Falcon AI Detection and Response

Cyber threats are evolving faster than ever — and security teams need AI that doesn’t just detect threats, but understands and responds to them in real time. In this video, we explore CrowdStrike Falcon AI Detection and Response (AIDR) and how it transforms modern security operations. Powered by the CrowdStrike Falcon platform, AIDR leverages advanced artificial intelligence to automatically identify, categorize, and prioritize threats with speed and precision — helping SOC teams cut through alert noise and focus on what truly matters.

How to set up the OTP Verification plugin with Tutor LMS Login Form?

The miniOrange OTP Verification Plugin helps verify the authenticity of email addresses and mobile/phone numbers during login. OTP Verification sends a unique One-Time Password (OTP) to users, ensuring that the provided contact details are genuine and accessible. This helps prevent fake logins and improves overall website security. In this video, we will walk you through the step-by-step process of setting up the miniOrange OTP Verification plugin with the Tutor LMS Login form. Secure your Tutor LMS login process and allow only verified users to access your platform.

How to Configure Confluence OAuth/OIDC SSO Integration with Keycloak | Step-by-Step Guide

Simplify your team's access to documentation by centralizing authentication. By integrating Keycloak with Confluence using the miniOrange OAuth/OIDC SSO plugin, you can provide a secure, one-click login experience while maintaining full control over your user identity data. In this video, we walk through the end-to-end setup: starting with creating a Client in the Keycloak Admin Console and finishing with the final configuration in the Confluence Administration dashboard. You will see exactly how to manage Realm settings, redirect URIs, and attribute mapping to ensure a smooth SSO flow.