Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Building Digital Operational Resilience in the DORA Era

In this session, our team breaks down the Digital Operational Resilience Act (DORA) — the EU regulation reshaping cybersecurity expectations across the financial sector. DORA mandates continuous testing and validation of critical live production systems, emphasizing adversary emulation and real-world attack simulations to ensure true operational resilience. Learn how organizations are adapting their programs, what the rise of the Chief Resilience Officer means for cybersecurity leadership, and how continuous validation supports both compliance and readiness.

How a Leading Bank Unlocked AI - Without Breaking Data-Sovereignty Laws

In many countries — especially in India and across the Middle East — strict data-sovereignty laws prevent banks and enterprises from using cloud-based AI models like Gemini, GPT, or Anthropic. Sending personal or financial data outside national borders can violate compliance rules, blocking the adoption of AI. This video shows how Protecto helped a leading bank overcome these challenges. By deploying Protecto’s context-aware protection layer inside the bank’s private cloud, the bank could safely use advanced AI models while staying fully compliant.

Decrypting Microsoft Defender for Endpoint Licensing with Ken Westin

Defender Fridays - Decrypting Microsoft Defender for Endpoint Licensing with Ken Westin Join us for this week's Defender Fridays as we explore the complex world of Microsoft Defender for Endpoint licensing with Ken Westin, Senior Solutions Engineer at LimaCharlie. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Agentic AI Ransomware: What You Need to Know

Brace yourself for agentic AI ransomware. It's a terrifying fusion of cutting-edge tech and malicious intent that's set to redefine cyber threats as we know them. Unlike traditional ransomware, which follows pre-programmed rules, agentic AI ransomware can adapt its behavior in real-time based on its environment and the defenses it encounters.

Cloudflare Connect 2025 Highlights: Common, James Allworth, David Tuber & Kenton Varda

We cover Cloudflare’s partnership with Mastercard & Visa on AI agent commerce, highlights from rapper Common, and conversations with: Full interviews with each guest will be published in the coming weeks. Plus: next week’s Cloudflare blog series on Internet Measurement, Resilience, and Transparency — the foundations of a faster, safer, and more reliable web.

How I 'Hacked' an Online Store #businesslogic #ecommerce #cybersecurity #apisecurity

A $10,000 Order for $1? Your Business Logic is Broken Attackers aren't just breaking code; they're exploiting the rules of your business to commit fraud. When your application's logic is flawed: Your payment and fulfillment systems can be desynchronized. You can lose massive revenue to easily preventable abuse. Your inventory and financial reporting become unreliable. Watch how a simple business logic flaw can lead to catastrophic financial loss in this real-world example. Is your e-commerce platform safe?