Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How LivePerson automates vulnerability management to reduce risk

For modern security teams, managing vulnerabilities efficiently is critical to reducing risk and maintaining a strong security posture. However, the sheer volume of vulnerabilities, complex IT environments, and resource constraints make traditional approaches unsustainable. Automating key aspects of vulnerability management not only speeds up remediation, but also ensures consistency and accuracy across the entire vulnerability lifecycle.

Falcon Cloud Security - AWS IAM Identity Center Detections

CrowdStrike Falcon Cloud Security can automatically identify IAM Identity Center user risks, such as use of stale user accounts, suspicious web-based activity and address them before attackers strike. Subscribe and Stay Updated: ► Don't miss out on more exciting content! Subscribe to our channel for the latest updates, case studies, and more from the world of cybersecurity. Hit the bell icon to receive notifications whenever we post new videos.

CrowdStrike Falcon Next-Gen SIEM: Log Collector Fleet Management

Efficient log collection is only half the battle—managing your collectors at scale is just as critical. With Fleet Management, CrowdStrike makes it easy to scale and maintain your log infrastructure, delivering enhanced visibility, control, and actionable insights for your SIEM operations. In this demo, we walk through how the Fleet Management simplifies the deployment, configuration, monitoring, and management of collectors across your environment.

Turn Data Security Question into Answer - Netwrix Access Analyzer Supports Natural Language Prompts

Turn Data Security Questions into Answers - Instantly! With the new MCP integration, Netwrix Access Analyzer supports natural language prompts in tools like Claude Desktop and Microsoft Copilot Studio, helping your team surface actionable insights faster and strengthen your security posture. Just ask: No scripting or digging through dashboards. Just fast, actionable answers, when and where you need them.

Unconventional Paths to Cybersecurity (AKA keeping your Nan Safe From Hackers)

How does surviving adversity lead to impact in cyber? In this episode of Razorwire, James Rees sits down with Jemma, founder of CultureGem, to explore the human side of security. From homelessness to industry influence, Jemma shares how unconventional paths can drive powerful contributions in InfoSec. You’ll hear her take on “cyberlebrities”, budget waste, accessible learning, and why protecting people—not just data—matters most.