Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI vs. Legacy Systems: Why Your Old Documentation Isn't Safe

AI vs. Legacy Systems: Why Your Old Documentation Isn’t Safe In this A10 Networks discussion, "APIs are the Language of AI: Protecting Them is Critical," security experts Jamison Utter and Carlo Alpuerto tackle one of the most overlooked threats in modern IT: the "specter in the shadow." For years, many organizations relied on "security through obscurity"—the idea that if a system is old or undocumented, it's safe from attackers. However, AI has changed the rules. These systems can now decipher legacy documentation and communicate with obscure systems faster than a human ever could.

Driving Innovation: How Arctic Wolf Powers the BWT Alpine Formula 1 Team's Cybersecurity Excellence

Arctic Wolf and the BWT Alpine Formula One Team share a passion for speed, power, and precision. Discover how Arctic Wolf is transforming Alpine's cybersecurity by providing 24x7 protection for the entirety of their environment – trackside, at the factory, and everywhere in between.

Save Time With GitGuardian's ML-Powered Similar Incident Grouping

GitGuardian is excited to introduce Machine Learning Powered Similar Incident Grouping, which cuts through the noise by identifying incident-specific patterns across your inventory and clustering incidents that belong together, so you can handle repetitive cases efficiently and reduce incident response toil.

Detect OPERATOR PANDA at the Edge with Falcon Adversary Overwatch

CrowdStrike Falcon Adversary Overwatch: ► Detect adversaries hiding in your blind spots. Falcon Adversary Overwatch exposes threats targeting network edge devices—firewalls, routers, and infrastructure traditional security tools can’t see. Watch the demo to see how CrowdStrike detects OPERATOR PANDA in real time and stops edge-driven intrusions that quickly turn into credential theft and identity abuse before they escalate.

Auth0 Strengthens Resiliency and Service Reliability with Datadog

Auth0, part of Okta, is one of the most trusted identity platforms in the world—helping enterprises secure authentication and customer logins at massive scale. Their business depends on resiliency and reliability, and they maintain an extremely high SLA of 99.99% uptime. Because even seconds of downtime can impact customer logins, Auth0 set out to strengthen observability with Datadog across their entire environment and accelerate the way their teams detect, troubleshoot, and resolve issues.

AI in Cybersecurity: Force Multiplier or Just More Noise? #podcast #aisecurity #aicybersecurity

Is AI actually making security teams safer—or just adding more noise? In this episode of IEN's Security Breach podcast, SafeBreach CTO Itzik Kotler joins Jeff Reinke to break down how attackers are using AI, why alert fatigue keeps getting worse, and what security teams should focus on before chasing the next “shiny object.” This conversation is a grounded take on preparation, detection engineering, and using AI intentionally—not reactively.

Configuration Drift: Why 99% of Cloud Failures Are Customer-Caused

"Gartner estimates that 99% of cloud security failures through 2025 will be the customer's fault, primarily due to misconfigurations." Don’t become part of the statistic. Take our configuration drift product tour for a spin. Consider it some light work before the weekend. Most breaches don’t stem from cloud provider failures, but from customer-side issues like misconfigurations, weak identity controls, and unmanaged change.