Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How an Energy Customer Used FERC 887 Compliance to Boost Security

Corelight CEO Brian Dye shares how a customer in the energy sector turned a mandatory compliance project into a broader security win. Brought in to meet FERC 87 monitoring requirements for bulk electric systems, Corelight also helped advance their security operations. The customer used the compliance mandate not just to check a box—but to gain meaningful visibility and security value from day one.

How Corelight Deployed Zeek at 20 Sites in 4 Months After 7-Year Stalemate

Corelight CEO Brian Dye shares the story of the company’s first multi-million-dollar customer—a team that had spent seven years trying to operationalize Zeek using another commercial vendor. With Corelight, they were up and running across 20 sites in just four months. This story highlights the foundational value Corelight provides: a hardened, scalable Zeek deployment that unlocks visibility, incident response, and threat hunting at scale.

You've got the traffic, but what about the conversions?

If your Shopify store is losing customers at critical checkpoints, now’s the time to act. Learn how to fix your sales funnel in our upcoming Exclusive Webinar: ����������: Turning Visitors into Buyers: How to Reduce Customer Drop-Offs and Increase Conversions�������� & ��������: June 11th, 2025 (12:30 PM CEST) | June 12th, 2025 (3:00 PM EDT)

The Journey to SASE: a CxO Perspective | SASEfy 2025

True transformation happens when networking and security move at the speed of business. That’s what SASE makes possible. In his session at, Cato’s Chief Strategy Officer Yishay Yovel, shares how SASE aligns infrastructure and business transformation — creating a platform that’s simple, agile, and future-ready.

API Security Issues

How to Fix the Challenges with Web App Firewalls A10 expert Jamison Utter discusses with Gary Wang why API security is a challenge to manage, as these APIs are headless and cannot be accessed through a login. There is no authentication mechanism, such as completing a CAPTCHA. APIs are also vulnerable to bots, which complicates matters. Watch the full video to learn more about multi-layered approaches, threat intelligence, behavioral analysis, and protection against modern threats like bots and APIs.

AI-Driven Cyber Defense in Action: How AI Agents Are Saving SOC Analysts From Burnout

AI-powered SOC platforms are revolutionizing cybersecurity by dramatically reducing false positives and enabling analysts to focus on high-value security work. In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Grant Oviatt, Head of Security Operations at Prophet Security, to explore how AI agents are transforming security operations centers (SOCs) and reshaping the future of cyber defense.