Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Automating Browser Extension Security with LimaCharlie and Secure Annex

Learn how to automate and strengthen your browser extension security through LimaCharlie's integration with Secure Annex. As browsers become the primary operating system for accessing sensitive data, the security risks posed by browser extensions continue to grow. In this session, you'll learn.

Proactive Security: Outpace the Adversary - CrowdStrike's AI-native Falcon Platform in Action

In today’s rapidly evolving cyber threat landscape, adversaries relentlessly refine their tactics to exploit vulnerabilities and breach enterprise environments. CrowdStrike’s AI-native Falcon Platform empowers teams with real-time detection, proactive exposure management, and at-scale remediation—ensuring a resilient defense against even the most sophisticated threats.

Inside Incident Response: Turning Chaos into Cohesive Teamwork

Our latest episode brings in security expert Iain Pye, who shares military tales with me, your host James Rees, about what really happens when everything goes wrong. We get stuck into the nitty-gritty of incident response - the sleepless nights, the pressure from executives, and how to keep your team going when they're running on fumes.

Netacea: Lifecycle of an automated attack

Business logic attacks are becoming more sophisticated as criminals invest time and effort into learning how their target websites, apps and APIs work. Many bot management solutions encourage cybersecurity and anti-fraud professionals to focus only on the execution phase of an attack when bots are active on a website, but there are several other phases that provide opportunity for disruption of an attack before this point.