Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The future of security operations with John Hubbard

Join us for this week's Defender Fridays as we explore the transformative impact of AI on Security Operations Centers with John Hubbard, SANS Senior Instructor and Cyber Defense Curriculum Lead. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Claude Code reads a threat report, hunts for IOCs, and deploys detection rules #cybersecurity #ai

From threat intelligence article to deployed coverage. The AI agent extracts indicators, searches for compromise across tenants, confirms clean status, then creates and tests detection rules for ongoing protection within your LimaCharlie environment.

The CEO's Take: Bridging the Cybersecurity Divide To Address Cyber Risk

“150 companies account for 90% of the technology products and services across the global attack surface. 41% of those companies had evidence of at least one compromised device in the past year.” With organizations as interconnected as they are, even organizations who “have” good cybersecurity are only as good as their weakest link.

Persistent Threats Are Coming-And Companies Aren't Ready #cyberattacks #2026 #defense

From evolving regulations and relentless cyber threats to the rise of AI, CISOs in 2026 are facing their toughest year ever. Discover what’s pushing security leaders to their limits—and why strong leadership and strategy matter more now than ever.#razorwirepodcast.

Under The Light: Operationalizing CTEM with Falcon Exposure Management

CTEM promises a better way to manage exposure but only if it can be operationalized. In this lightboard session, we break down the CTEM framework and show how Falcon Exposure Management turns it into a continuous, actionable program—helping teams reduce noise, validate real risk, and drive measurable exposure reduction.

How to Import Your Passwords Into Keeper

Keeper Web and Desktop App version 17.5 integrates an improved import experience that guides you through uploading your passwords from web browsers, other password managers or a text file. You can then review, edit and customize how you would like the new records to appear in your vault within an easy to use field mapping interface.

Ep. 42 - Iran's Cyber Shadow War: IRGC, MOIS, and the Battle for Control

*Episode 2 of 6 – Iran’s Cyber Program Explained* In *Iran’s Cyber Shadow War: IRGC, MOIS, and the Battle for Control*, we continue our deep-dive into Iran’s cyber operations by exposing the internal power struggle driving its most dangerous digital attacks.