Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security Comprehension and Awareness Measure (SCAM) Demo

What happens when a state-of-the-art AI assistant can read your email, browse the web, and fill in your passwords — but can’t reliably tell a scam from the real thing? In this video, you’ll see real examples of frontier AI agents: These aren’t edge cases. This is the result of 1Password’s new benchmark: SCAM — Security Comprehension & Awareness Measure.

Five shifts that will shape your security team in 2026

The new year brings renewed energy, refreshed goals, and sharper priorities. But at the same time, clarity can be hard to find as AI changes how work gets done, expectations rise, and cyber risk grows. As 2026 begins, several major shifts are already shaping how security teams operate, collaborate, and find satisfaction in their work.

Episode 8 - Enterprise Nervous System: Using Network Signal to Direct Business Strategy

In this episode of Corelight Defenders, I’m joined by Bernard Brantley, Chief Information Security Officer at Corelight, as we delve into the concept of the enterprise nervous system. Bernard shares insights from his extensive experience in network analysis, explaining how organizations can leverage their network traffic data to enhance security and drive business outcomes. We discuss the importance of understanding the interdependencies between assets, processes, and goals, and how security teams can position themselves as integral to business success rather than just risk mitigators.

Vibe Coding & AI Coding Assistants: Who Secures AI-Generated Code?

84% of developers are using or planning to use AI tools in their workflow (Stack Overflow, 2025). AI coding assistants like Codex, GitHub Copilot, and CodeWhisperer are changing how we build software. But here’s the real question: Who secures AI-generated code? In this video, we break down: If you’re using AI to write code, you need: AI-generated code is still code. It must be reviewed, validated, and monitored.

Ep. 45 - Teen Hackers, SIM Swaps & Russian Ransomware

In Part 2 of our Russia cyber threat series, we unpack the Western cybercrime ecosystem powering Russian ransomware operations. We examine *Scattered Spider, LAPSUS$, and Shiny Hunters*, and how social engineering, SIM swapping, MFA bypass, and AI-driven voice spoofing are breaching Fortune 100 companies — without zero-days. Learn how access brokers commoditize breaches, why help desks are prime targets, and what this shift means for CISOs and security teams.

Introducing the Keeper Security Slack App

The Keeper Security Slack App brings zero standing privilege and streamlined credential workflows directly into Slack – the platform your team already uses every day. This powerful integration connects your Keeper Vault with Slack, enabling secure credential access requests and approvals without ever leaving your workspace.

Detect OPERATOR PANDA at the Edge with Falcon Adversary Overwatch

CrowdStrike Falcon Adversary Overwatch: ► Detect adversaries hiding in your blind spots. Falcon Adversary Overwatch exposes threats targeting network edge devices—firewalls, routers, and infrastructure traditional security tools can’t see. Watch the demo to see how CrowdStrike detects OPERATOR PANDA in real time and stops edge-driven intrusions that quickly turn into credential theft and identity abuse before they escalate.