Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Memcyco FM Show: Episode 10 - Stopping Fake Mobile Apps and Account Takeover (ATO)

Fake apps are the latest evolution of brand impersonation, and they’re proving just as dangerous as phishing sites. Fraudsters clone legitimate mobile apps, publish them on official app stores, and trick users into entering credentials — which are then reused in the real app before anyone notices. Given that over 60% of web traffic is now mobile, this form of phishing-driven credential reuse has become one of the top blind spots in mobile fraud defense. Yet most mobile security tools can’t detect it — because they don’t know where those credentials came from.

Evaluating AI Security: Performance vs. Safety

Evaluating AI Security: Performance vs. Safety In this video, A10 Networks' security leaders Jamison Utter, Madhav Aggarwal, and Diptanshu Purwar discuss the crucial considerations for evaluating AI security within an organization. Madhav Aggarwal emphasizes the following points: AI companies operating in this evolving frontier. It is often difficult to attain both through the same AI model. This segment delves into why achieving both can be a complex task through the same model.

Why Threat Exposure Management Is Broken - And What Needs to Change | ESG + Nucleus Security

Security teams today aren’t struggling to find issues; they’re struggling to reduce risk in a measurable, scalable way. In this webinar, ESG Principal Analyst Tyler Shields joins Nucleus Security to unpack brand-new research on the state of threat and exposure management (TEM).

The MemcycoFM Show: Episode 9 - Automated Brand Impersonation Protection: How It Works

Automated brand impersonation protection has become a baseline requirement for digital security. As phishing operations scale across web domains, mobile app stores, social platforms, and ad networks, attackers are moving faster and operating more broadly than ever before. Traditional defenses – periodic scans, manual takedowns, post-incident analysis – are too slow and too shallow. Today’s security teams need a real-time system that detects brand impersonation threats from the earliest reconnaissance stage through live user engagement, and neutralizes them before customer trust, credentials, or revenue are compromised.

CrowdStrike Falcon Next-Gen SIEM Correlation Rule Template Discovery Dashboard

Finding the right detection content can be a challenge. The Correlation Rule Template Discovery Dashboard in CrowdStrike Falcon Next-Gen SIEM makes it easy to discover, explore, and activate relevant correlation rules—based on the data you already ingest. This demo highlights key features like compatibility mapping, real-time data source health, and automatic surfacing of new and updated templates. Stay aligned with the latest threats and streamline detection engineering in just a few clicks.

Falcon Cloud Security AI Security Posture Management (AI-SPM): Demo Drill Down

Unify AI visibility with AI-SPM, Detect AI package vulnerabilities, Expose AI packages in the cloud, Fix AI model risks fast. Find threats faster and stop breaches in your AI pipeline with Falcon Cloud Security. Subscribe and Stay Updated: ► Don't miss out on more exciting content! Subscribe to our channel for the latest updates, case studies, and more from the world of cybersecurity. Hit the bell icon to receive notifications whenever we post new videos.