Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloudflare AI Security Suite: Protect AI-powered apps with Firewall for AI

AI is powerful and organizations continue to adopt AI at a rapid pace, but without protections in place, it’s risky. In this session, you'll learn about the risks Enterprises face around AI and how Cloudflare provides a layered security approach incorporating AI Security. We’ll walk through how you can secure your AI-powered applications with Cloudflare.

Adam Levine: How Banks Can Enter Digital Assets Without Replatforming | FINTECH.TV

Banks don't need to rip and replace their systems to capture the digital asset opportunity. Adam Levine, CEO of Fireblocks Trust Company and SVP of Corporate Development, sits down with FINTECH.TV's Remy Blaire at Ondo Summit 2026 to break down how traditional institutions can build foundational infrastructure while maintaining legacy rails. Timecodes Key Topics.

What Is Phishing?

Phishing remains one of the most widespread and damaging cyber threats facing organizations today. Attackers craft deceptive messages designed to trick users into revealing credentials, financial information, or installing malware. To make matters worse, the tactics continue to evolve. Originating in the mid‑1990s, phishing has grown into a sophisticated weapon. Modern attackers now use AI, social media intelligence, and high‑quality impersonation techniques to create convincing campaigns that are harder than ever to detect.

What Are Insider Threats?

Cybersecurity isn’t only about defending against external attackers. Some of the most damaging risks come from within an organization. These are known as insider threats. An insider threat occurs when someone with authorized access—whether intentionally malicious or simply negligent—compromises systems, exposes data, or undermines security controls. This can result in data breaches, financial loss, regulatory issues, and long‑term reputational damage.

Internet Exposure and Vulnerability Risk: Why Reachability Changes Everything

In this conversation, Ryan Cribelar, R&D Engineer at Nucleus Security, breaks down why internet exposure is one of the most important layers of context in vulnerability and exposure management. Security teams are flooded with vulnerability data, but not every finding carries the same level of risk. As Ryan explains, whether a vulnerability is reachable from the internet can dramatically change how urgent it really is. Internet exposure shortens the path from discovery to exploitation and often determines whether a vulnerability is theoretical or immediately actionable.

Attackers exploited OpenClaw's popularity #cybersecurity #ai #podcast

In this week's Intel Chat, Chris Luft and Matt Bromiley discuss how a malicious VS Code extension impersonated OpenClaw (formerly ClawdBot) to distribute remote access malware to developers. Matt breaks down a critical pattern: whenever there's a stampede toward new technology, threat actors will find a way to inject a malicious version of it. The episode also covers PeckBirdie (a JScript-based C2 framework), Shiny Hunters' massive phishing campaign, and a Russian cyberattack on Poland's power grid.

Tanium Basics - Console Navigation, No Compass Needed - Tanium Tech Talks #154

New to Tanium or just need a refresher? In this Tanium Basics kickoff episode, Jesh and Alex walk through the console UI - from environment status to modules and shortcuts - so you can navigate with confidence! What you’ll learn: Environment Status panel provides quick‑hit visibility Question Bar and Search Endpoints streamline activities Quick Links save significant time Tanium Ask enables natural language queries Modules & Shared service navigation supports core workflows Administration menus offer insight & operational controls The power of Question Builder.

AI Principles in Practice: Auditability in non-negotiable

When AI acts on your behalf, auditability is non-negotiable. In the latest Principles in Practice video, Anand Srinivas, 1Password VP of Product & AI, explains why every AI agent action involving credentials must leave a clear audit trail: Who approved the access and why When and where were credentials used What did the agent access and when Did access end when the task was completed Without auditability, AI usage can break trust between employees, security teams, customers, and regulators.