Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Off the Blocks | Ep. 1: What myths in digital assets need to be debunked?

New series. Real talk. No fluff. Welcome to Off the Blocks, a rapid-fire video series from Fireblocks filmed on the ground at TOKEN2049 Singapore. In Episode 1, we asked builders, investors, and operators one bold question: What’s the biggest myth in digital assets that needs to go? Their answers are sharp, surprising, and sometimes controversial. This isn’t your average crypto panel. It’s unfiltered insight from the people shaping the future of finance.

Logs & Lattes: Episode 3 - Recognition Without Compromise: Graylog's Rise in the SIEM Market

Graylog earned recognition from both Gartner and GigaOm, and it is reshaping how teams think about SIEM. In this episode of Logs & Lattes, host Palmer Wallace talks with Kimber Spradlin, Chief Marketing Officer at Graylog, about what this dual recognition means for customers, analysts, and the future of security operations.

Recognition Without Compromise: Graylog's Rise in the SIEM Market

Graylog earned recognition from both Gartner and GigaOm, and it is reshaping how teams think about SIEM. In this episode of Logs & Lattes, host Palmer Wallace talks with Kimber Spradlin, Chief Marketing Officer at Graylog, about what this dual recognition means for customers, analysts, and the future of security operations.

Password Policy: A History of Getting It Wrong and how to do it right in 2025 | October Cyber Bytes

In this session, Sedara’s David Frier explores the fascinating history of password policies—how the industry went wrong in the early 2000s, and what we’re finally getting right in 2025. From outdated complexity rules to modern authentication standards, this webinar breaks down decades of password practices and reveals how organizations can strengthen security while making life easier for users.

How AI Cuts SIEM Migration Time from Months to Minutes

SIEM migration is tedious, time-consuming, and pulls security professionals away from actual security work. Manually exporting thousands of detection rules, translating query logic, and fixing errors can take weeks or months. In this episode of AI can do what now?!, Haran Kumar (principal security solutions architect at Elastic) walks through how AI actually helps automate SIEM migration.

Intel Chat: Kansas City National Security Campus breach, COLDRIVER, KEV catalog & AWS outage [260]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Newer article link. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

LDAP Nightmare - Windows LDAP Denial of Service Vulnerability

In this technical webinar, SafeBreach security experts explore recent LDAP vulnerabilities, focusing on CVE-2024-49113 — a critical flaw capable of crashing unpatched Windows Servers. The team breaks down: This session emphasizes the importance of proactive patching, continuous validation, and understanding the underlying mechanics of directory services to strengthen enterprise resilience.