Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Zero trust with Chase Cunningham

Join us for this week's Defender Fridays as we explore Zero Trust architecture and implementation with Dr. Chase Cunningham, Chief Security Officer at Demo-Force. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

What's Next in Cyber Economics: 2026 Security Strategies from Industry Leaders

Security leaders are bracing for a pivotal shift in 2026. Attacker economics are evolving, extortion models are changing shape, and organizations are rethinking how they allocate resources to defend against more scalable and financially motivated threats. In this on-demand webinar, four industry experts break down the forces reshaping cybersecurity strategy and offer practical guidance for leaders preparing for the next wave of challenges.

CISO Guide: 3 Steps to Stop Business Logic Abuse in Design #ciso #businesslogic #apisecurity

Fixing Business Logic Abuse starts at the whiteboard, long before code is written. Here is the three-step defense: Map Critical Workflows: Visualize data flows and state transitions for all high-value features. Implement Adversary Emulation: Integrate the hacker's mindset into your process to find flaws early. Test Constantly: Refine and re-test the logic at every phase of the CI/CD pipeline.

How 2025 Reshaped SOCs and What Matters in 2026

Security teams spent 2025 operating at maximum load. Alert volume kept rising, analysts pivoted across too many tools, AI arrived faster than governance could support, and cloud costs shaped what data teams felt safe keeping. In this episode of Logs and Lattes, host Palmer Wallace and Jeff Darrington break down what actually happened inside real SOCs and how those lessons are already guiding 2026.

Real-Time Cloud Detection & Response - 2025 MITRE ATT&CK Enterprise Evaluations

For the first time, the 2025 MITRE ATT&CK Enterprise Evaluations tested cloud detection and response capabilities, and CrowdStrike delivered 100% detection and protection with zero false positives. The evaluation simulated Scattered Spider attacks achieving AWS admin access in under one minute. Traditional cloud security struggles with delayed log processing, but CrowdStrike's real-time cloud detection analyzes logs instantly for immediate visibility.

CrowdStrike Leads the Way in the 2025 MITRE ATT&CK Enterprise Evaluations

The results of the 2025 MITRE ATT&CK Enterprise Evaluations are in and CrowdStrike excelled, achieving 100% detection, 100% protection, and zero false positives. The MITRE ATT&CK evaluation is an independent assessment that tests how cybersecurity products detect and stop real-world adversary behavior. The 2025 round was the most challenging cross-domain evaluation to date, a true platform test. For the first time, MITRE tested defenses across endpoint, identity, and cloud.

Your Digital Footprint and Why it Matters!

You know that trail of bread crumbs you leave across the internet? Cybercriminals love to eat them up! Every post. Every like. Every old username from 2012, it all sticks around. And scammers can use that info to guess passwords, target you, or piece together your whole life story. So post smart. Share less. Protect more.

Logs & Lattes Episode 4: How 2025 Reshaped SOCs and What Matters in 2026

Security teams spent 2025 operating at maximum load. Alert volume kept rising, analysts pivoted across too many tools, AI arrived faster than governance could support, and cloud costs shaped what data teams felt safe keeping. In this episode of Logs and Lattes, host Palmer Wallace and Jeff Darrington break down what actually happened inside real SOCs and how those lessons are already guiding 2026.

CISO Workshop on API Threat Modeling: How to Use STRIDE to Predict, Prevent, and Protect

Threat modeling is a critical function for effective cybersecurity and threat models must adapt to emerging threats. As API deployments grow across organizations, cybersecurity teams need to extend their threat modeling to include the API attack surface. In this webinar, we'll examine threat modeling best practices for APIs, focusing on the STRIDE methodology. Attendees will learn.