Cybersecurity Is No Longer Just the CISO's Responsibility; It's Everyone's

In Episode of Guardians of the Enterprise, Ashish Tandon, Founder & CEO, Indusface, spoke with Madhur Joshi, CISO at HDB Financial Services (part of the HDFC Group), about building a security-first culture across the organization. They discussed how cybersecurity is no longer limited to IT, and why embedding security into every business function is critical. Watch this video to learn how HDB Financial Services has made cyber security a shared responsibility across teams.

How to Scale as an MSP by Combining Firewalls and Integrated Security Services

Scaling MSP business has become increasingly complex in a landscape where threats evolve rapidly, and emerging technologies are constantly expanding the attack surface. According to the World Economic Forum’s Global Cybersecurity Outlook 2026, 61% of organizations identify the rapid evolution of the threat landscape and emerging technologies as the primary challenge to strengthening cyber resilience. In addition, 77% of respondents have observed a widespread increase in online fraud and phishing.

Falcon Next-Gen SIEM Simplifies Onboarding with Sensor-Native Log Collection

As organizations expand their SIEM footprint, data onboarding often becomes a bottleneck. Deploying log collectors at scale typically requires coordination across multiple teams, external software distribution systems, packaging workflows, and change-control approvals. All of this impedes visibility when speed is critical. Adversaries are breaking out to move laterally across environments in as little as 27 seconds, according to the CrowdStrike 2026 Global Threat Report.

Beyond Human Scale: The Shift to Machine-Speed Defense

Modern threats move faster than humans can process. Join UpGuard CISO Phil Ross to discover how to replace manual bottlenecks with a machine-speed operating system for risk that orchestrates vendor, human, and attack surface defenses into one unified strategy. Interested in finding out more about UpGuard?

What is email threat prevention? A complete guide in 2026

Email Security Email Security Stop modern email-borne attacks with real-time AI defense. Please wait, this may take a few seconds... Email threat prevention is a comprehensive security technique that identifies, blocks and neutralizes email threats such as phishing, malware, and business email compromise (BEC) before they reach a user’s inbox. It combines multiple layers of defense, including AI-driven analysis, URL scanning, attachment sandboxing and authentication protocols like DMARC.

How Keeper Helps Reduce Insider Threats in Healthcare

Insider threats in healthcare often originate from trusted employees, third-party vendors or contractors who have standing access to critical systems. When privileged access is not closely monitored, healthcare organizations face significant consequences, including compromised patient safety, exposure of Protected Health Information (PHI), disruption to clinical operations and Health Insurance Portability and Accountability Act (HIPAA) compliance violations.

AI Deepfakes & Laptop Farms: Inside the 2026 Cloudflare Threat Report

In this episode of This Week in NET, host João Tomé is joined by Cloudflare threat intelligence experts Brian Carter and Chris Pacey to break down the 2026 Cloudflare Threat Report and what it reveals about today’s cyber threat landscape. We discuss how threat intelligence helps organizations prioritize risks, how attackers are increasingly leveraging automation and AI tools, and why botnets, supply-chain attacks, and credential-theft campaigns continue to evolve.

When Detection Isn't Enough: Limits of Microsoft Defender

Many MSPs rely on Microsoft Defender as a starting point for protecting customer environments. It’s built in, familiar, and good at generating alerts. But modern attacks don’t stop when an alert appears. They often use stolen credentials, legitimate tools, and cloud access to move quickly after detection. In this session, WatchGuard’s Worldwide MDR Channel Sales Manager Jen Rose will look at how attacks unfold in Microsoft Defender environments and why detection alone leaves gaps for MSPs and their customers.