Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Advanced Threat Hunting Demo: Brickstorm APT

Is your VMware environment secure? A sophisticated backdoor called BRICKSTORM, used by espionage actor UNC5221, could be hiding in your vCenter backups right now. Restoring from a compromised snapshot means letting the attackers right back in. But what if your backups could be your best defense? In our new 4-minute demo, we walk through the exact steps to: Proactively hunt for BRICKSTORM within your backups using YARA rules. Instantly quarantine infected snapshots to stop the threat from spreading. Identify a guaranteed 'Gold Copy' for a fast, safe, clean-room recovery.

Modern SecOps: What an AI-ready SOC actually means with Anton Chuvakin

Defender Fridays - Modern SecOps: What an AI-Ready SOC Actually Means with Dr. Anton Chuvakin Join us for this week's Defender Fridays as we explore what it actually means to build an AI-ready SOC with Dr. Anton Chuvakin, Security Advisor at the Office of the CISO for Google Cloud. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

A Guide to Cloudflare Load Balancing Setup (Step-by-Step Walkthrough)

Setting up Cloudflare Load Balancing (LB) made easy! In this in-depth tutorial, we walk you through the essential pre-activation steps for Cloudflare Load Balancing. From understanding the core concepts to configuring your initial pools and health checks, this video covers everything you need to know to get started. If you're looking to improve your website's uptime, latency, and availability, this is the place to start.

How to Set Up Auto-Activation for Users in Jira | miniOrange Automated User Management

This video tutorial walks you through how to configure the automation to Auto-Activate Users in Jira using the miniOrange Automated User Management app. Learn how to automatically restore Atlassian product access for users whose permissions were removed, reducing manual updation. With this feature, you can: Other Products.

Exabeam Security Intelligence Summit UKI 2025 | Event Highlights & Key Takeaways

Relive the highlights from the Exabeam Security Intelligence Summit in London, where security leaders, users, and partners across the UK and Ireland gathered for a day of innovation and collaboration. From breakthrough AI advancements in SIEM and UEBA to inspiring customer success stories and hands-on breakout sessions, this event was more than just a conference, it was a community redefining the future of cybersecurity. Don’t miss the energy, insights, and connections that made this summit one to remember.

Exabeam Security Intelligence Summit UKI 2025 | Partner Track Highlights

Partners from across the UKI region joined us in London for the Exabeam Security Intelligence Summit. This video captures highlights from our Partner Track, where we launched the new APEX Partner Program: built to drive profitability, accelerate enablement, and create the most partner-driven ecosystem in cybersecurity. Watch the recap of the event and see how we’re raising the bar – together. Subscribe for more product demos and cybersecurity insights!

The Key To Detecting AI Threats - CTRLtheThreat Cybersecurity Tips From Cato CTRL

The key to detecting AI threats? Detecting them before they detect you. Tune in to this week's series in which Dolev Attiya, threat researcher and member of Cato CTRL, shares insights about AI malware threats, agent to agent and top ways to stay protected. Subscribe: short.url/aBcXyZ Let’s connect: Instagram: short.url/aBcXyZ LinkedIn: short.url/aBcXyZ X (Twitter): short.url/aBcXyZ TikTok: short.url/aBcXyZ.