Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Is AI a cost-effective solution to alert noise? #cybersecurity #AI #SOC #podcast

Security teams are drowning in alerts, and AI might not be the answer everyone thinks it is. In this episode, Erik Bloch, VP of Security at Illumio, breaks down the math on why AI-powered alert triage may be financially unfeasible for most organizations. With 85 to 90 percent of alerts being non-malicious, security teams are still sorting through massive volumes of noise to find the real threats. Many vendors are betting that AI will solve this problem by triaging alerts at scale. But the reality?

How Hackers Steal Your Identity So Fast!

Recent UK breaches highlight how commoditised attacks and dark net markets provide ready stolen credentials for intrusions. Continuous authentication and behavioural analytics shift focus from the initial login to how a user interacts with data and resources, helping detection when attackers try to impersonate genuine behaviour.

Top CISO Priorities and Global Digital Trust with Morgan Adamski

Welcome to Data Security Decoded. Join host Caleb Tolin in conversation with Morgan Adamski who leads Cyber, Data, and Tech Risk at PwC and is a former US national security leader who spent 16 years tracking nation-state threats inside the US government. Coming out of a career spent inside secure facilities without windows or phones and working to address China’s prepositioning in US critical infrastructure, Morgan shares a direct view of how geopolitics is now shaping cyber risk decisions in boardrooms.

Security Visionaries | Disrupt or Defend? An AI Grudge Match

What does the rise of generative AI mean for the mandates of a CIO and CISO? In this episode of Security Visionaries, host Emily Wearmouth is joined by Netskope's Chief Digital & Information Officer (CDIO) and Chief Information Security Officer (CISO) to discuss top tips for both disrupting and defending your organization in the age of generative AI.

Falco for Kubernetes runtime security (eBPF, Rules, Tuning & Alerts)

Runtime attacks don’t wait for your next scan. Falco detects suspicious behavior in real time across Kubernetes, containers, and Linux hosts—using syscall signals (eBPF/kernel module) plus a rule engine and plugins. In ~10 minutes, you’ll learn how Falco works end-to-end, where it fits in a modern cloud-native security stack, and how to operationalize it without drowning in noise. In this video: Getting started checklist (practical).

Secure Your AWS Cloud with Falcon Next-Gen SIEM: Seamless Integration & Intelligent Detection

See how Falcon Next-Gen SIEM delivers instant, frictionless integration with AWS for full visibility in minutes. Watch how pre-built detections analyze every API call, connecting events into clear attack stories. With automated response playbooks that take immediate action, you can detect faster, respond smarter, and stop cloud threats before they spread. CrowdStrike Falcon Next-Gen SIEM: Consolidate security operations with the world’s most complete AI-native SOC platform.

Reach Security Ranked #5 on the TechRound100 | Exposing and Fixing Real Security Risk

Honored to share that Reach Security has been named on the TechRound100, recognizing the most impactful and innovative startups of the year. This milestone reflects the problem we’re focused on solving: most organizations don’t lack tools—they lack visibility into how those tools are actually deployed. By exposing misconfigurations, shallow deployments, and missing protections, Reach helps teams fix the risks that matter most before they become incidents.