Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hunt an IP address across multiple tenants simultaneously with Claude Code #cybersecurity #ai

See Claude Code execute a parallel IOC hunt for a suspicious IP across multiple LimaCharlie organizations. The agent enumerates all available tenants, launches concurrent searches, normalizes results into match categories, and reports positive hits with sensor details, timestamps, and occurrence counts. Security teams can investigate threats across their entire fleet without manually querying each tenant.

Threat Intelligence: Hunt Agent

Threat hunting no longer requires hours of manual research or specialized expertise. CrowdStrike Hunt Agent uses intelligence driven hunting guides and Charlotte AI to automatically detect and analyze suspicious activity in your environment. See how analysts gain instant expert insight prioritize real adversaries and uncover threats before they become incidents.

Dinari bridges traditional markets and digital assets - S2E09

In this episode, we're excited to introduce Brandon Ooi, the COO of Dinari, a fintech innovator making compliant tokenized securities accessible to investors. Brandon co-founded Crunchyroll as its CTO and worked at Stripe as an engineer specializing in marketplace enterprises, bringing deep technical expertise and product leadership to the intersection of traditional finance and blockchain technology. Join us as we explore Brandon's journey from building beloved consumer platforms to pioneering the future of securities trading, and how Dinari is bridging the gap between traditional markets and digital assets.

Is your vendor data a source of insight-or just more noise?

For many risk and compliance leaders, the reality of Third-Party Risk Management (TPRM) is a mountain of disorganized spreadsheets, overflowing inboxes, and endless PDFs. When an audit is seven days away or the Board asks for a risk posture update, documentation overload becomes a liability. In this video, we explore the transition from vendor chaos to risk clarity. The Challenge.

Mastering Post-Quantum Cryptography and AI-Driven Cyber Threats

The cybersecurity landscape is undergoing a paradigm shift driven by two unstoppable forces: Generative AI and Shor’s Algorithm-capable Quantum Computing. As we approach "Q-Day," the window for organizations to transition to quantum-resistant architectures is closing. Modern threat actors are no longer just using brute force; they are utilizing Quantum-AI convergence to automate vulnerability discovery and bypass legacy encryption. This session provides a roadmap for transitioning from traditional cybersecurity to a Post-Quantum Cryptography (PQC) framework.