Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Reduce False Positives Automatically with @claude Code and LimaCharlie

Noisy alerts slow down every SOC. See how Claude Code with LimaCharlie can analyze your existing detection logic and trigger alerts to identify what's generating the noise and what can be done about it. After running the prompt, Claude Code reviews your rules and their trigger frequency, identifies the ones generating false positives, and produces specific recommendations for suppression rules to apply. In this example, it flags three rules and provides the logic to address each one, whether the issue stems from a syntax problem or detection logic that needs tightening.

Rebranding human risk management with Brandon Min

Join us for this session of Defender Fridays as we explore human risk management, security culture, and building empathy-driven security programs with Brandon Min, Founder and CEO at Herd Security. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Amit Malik gives you an inside look at new attack methods being used by adversaries

Attackers are using AI and LLMs in unique ways to increase their capabilities and minimize their footprint; so how can defenders respond? Don’t miss this episode of Data Security Decoded with Amit Malik, a Staff Security Researcher at Rubrik Zero Labs, who gives you an inside look at new attack methods being used by adversaries. Get Data Security Decoded wherever you listen to your podcasts, or subscribe to our channel!

The Network Blind Spot Adversaries Exploit

Did you know there may be a blind spot in your network right now? Firewalls, routers, and edge devices often generate minimal logs by default, creating visibility gaps that adversaries can exploit. In this breakdown, we examine how a China-nexus threat group known as Operator Panda leveraged vulnerable network devices to gain access, establish persistence, and remain undetected even after patches were applied.

Outpacing Modern Adversaries with the CrowdStrike Agentic SOC

Adversaries are weaponizing AI, accelerating tradecraft and moving from access to impact at machine speed. As breakout times collapse to seconds, security teams cannot rely on manual processes or static automation to keep up. Meet the CrowdStrike Agentic SOC, a new operating model built for the AI era.

Notepad++ Supply Chain Attack Explained | CrowdStrike OverWatch Identified It Months Early

Your next software update could be weaponized. In this short breakdown, we examine how adversaries compromised the Notepad++ update mechanism to distribute malware and how CrowdStrike identified the activity four months before public disclosure.