Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ethical Hackers & Bug Bounty: Our Security Journey #applicationsecurity #cybersecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Beyond Data Routing: Slash SIEM Costs with LimaCharlie's Security Observability Pipeline

Let’s face it - you’re struggling with managing massive volumes of telemetry and trying to efficiently optimize against budget. Typical observability pipeline tools only solve part of the problem - they route data but lack real-time detection, automation, and response capabilities. Watch this webinar as we demonstrate how LimaCharlie's security observability pipeline use case goes far beyond traditional solutions. With LimaCharlie, you can normalize any telemetry source into a common format while simultaneously enabling automated detection and response directly from your data streams.

How much deployment power should cyber operatives have?

Is it time for a dedicated cyber military branch? On episode 215 of the Cybersecurity Defenders Podcast, Hank Thomas, Managing Partner and Founder at Strategic Cyber Ventures, shares his journey from Army intelligence officer to cyber-focused venture capitalist. But the most pressing part of the conversation is his call for a structural overhaul in how the US military handles cyber operations.

Detection as Code with Falcon Next-Gen SIEM

Speed and precision are critical in stopping modern threats. Falcon Next-Gen SIEM brings Detection as Code to the forefront, allowing security teams to version, test, and deploy detection rules with confidence. With powerful API integrations and CI/CD pipeline support, teams can automate rule management, reduce manual errors, and respond to threats faster. Every rule is version-controlled, making it easy to track changes, roll back updates, and scale detection efforts across the organization.

#215 - Inside cyber warfare and intelligence with Hank Thomas, Founder at Strategic Cyber Ventures

Is it time for a dedicated cyber military branch? On episode 215 of the Cybersecurity Defenders Podcast, Hank Thomas, Managing Partner and Founder at Strategic Cyber Ventures, shares his journey from Army intelligence officer to cyber-focused venture capitalist. But the most pressing part of the conversation is his call for a structural overhaul in how the US military handles cyber operations.