Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Friday Flows Episode 42: Using Tines Workbench for the SOC Automation Capability Matrix

This week, Michael Tolan shows host Cameron Higgs how teams can use Tines Workbench to develop their automation strategy by comparing their progress to the SOC Automation Capability Matrix! Workbench is a Tines-powered AI chat interface where you can take action and access proprietary data in real-time, privately and securely.

How building Cloudflare with Cloudflare helps developers (with Celso Martinho)

Celso Martinho is a Senior Director of Engineering at Cloudflare. He works across multiple teams from Radar to Workers AI in our new Cloudflare Lisbon offices. In this conversation, host João Tomé and Celso discuss the rapid growth of Cloudflare Workers, simplifying life for developers, and the importance of observability in AI. Celso also dives into how the challenges for developers have changed since the 1990s tech era and why he believes the Internet is still in its infancy.

Detect and Protect Strategies for Malware Free Websites and APIs

Over 1 billion known malware threats exist, with an alarming 17 million new variants emerging each month! Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting. In this webinar, join Vivekanand Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

How to Avoid 3 Common Mistakes in Remediation Execution | Seemplicity

Learn how to avoid common mistakes in remediation plan execution with Seemplicity's Director of Product Marketing, Megan Horner. Discover three critical missteps - lack of accountability, poor prioritization, and reliance on manual processes - and gain actionable tips to address them. By enhancing accountability, focusing on high-risk vulnerabilities, and automating workflows, your organization can improve remediation efficiency and reduce cybersecurity risks.

Key Indicators of a Strong API Security Program - Do You Have Them? #securitymeasures #securitykey

What does a successful API security program look like? Discover the essential indicators that every organization should monitor, from inventory control to continuous monitoring and anomaly detection. Learn how these key metrics can safeguard your APIs and ensure your defenses are ready for emerging threats!