Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security Team's Secret: How to Make Everyone Love You! #cybersecurity #securityteam

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

A Real Example of Copilot Exposing Sensitive Data

Is Microsoft Copilot putting your sensitive data at risk? AI tools like Copilot can unintentionally expose sensitive information through indirect queries leading to data leaks, insider threats, and compliance risks. In this webinar, we break down real-world examples of how over-permissioned access and prompt manipulation can bypass security controls and what you can do to prevent it. Stay ahead of AI-driven threats.

Europol Warns of Social Engineering Attacks

Social engineering remains a primary initial access vector for cybercriminals, according to a new report from Europol. “Social engineering, which exploits human error to gain access to systems or personal information, stands out as a prominent technique used by criminal actors in this context,” Europol says.

EDR, DFIR and Endpoint Triage with Brian Carrier

Brian Carrier, CEO of Sleuth Kit Labs, joined Defender Fridays to discuss EDR, DFIR and Endpoint Triage. We explored how SOCs can effectively investigate endpoints after alerts to decide whether to wipe it or call an IR team. Brian covered leveraging EDR data and additional forensic artifacts for better Endpoint Triage, helping teams cut through the overwhelming amount of information to make informed response decisions.

Top Use Cases & Trends in Machine & Workload Identity

Speakers: As infrastructure becomes increasingly automated, the systems that deploy, manage, and scale it—CI/CD pipelines, service agents, orchestration tools—rely on a growing class of non-human identities (NHIs). These machine actors often operate with persistent credentials, excessive privileges, and limited visibility—leaving critical trust gaps in modern environments. This session explores three high-impact use cases where addressing NHI is both urgent and achievable.

7 SIEM Configurations To Improve Your Time to Value

Whether you’re an Apple fan or not, one of the reasons people buy into their ecosystem is ease of setup across different devices. In a world where people customize the applications on their laptops to cross over with their mobile phones, an easy setup is a key to getting the most value from their devices. However, in the world of security information and event management (SIEM) solutions, the time to value often takes longer than most security teams want to admit.

Why AI scam protection is more important than ever

Online scams are getting smarter—and harder to detect. Learn why AI-powered protection is essential in 2025, and how Avast Scam Guardian helps keep you safe from phishing, fake sites, and fraud—free for everyone. In a world where technology keeps us connected, informed, and entertained, it also creates new opportunities for scammers to sneak into our digital lives.

Normalize your data with the OCSF Common Data Model in Datadog Cloud SIEM

Security teams rely on SIEMs to aggregate and analyze data from a wide range of sources, including cloud environments, identity providers, endpoint protection platforms, network appliances, SaaS apps, and more. But every source delivers logs in its own format, with different field names, structures, and semantics. This fragmentation makes it difficult to build scalable, reusable detection rules or correlate threats across systems.

Switching to eBPF One Step at a Time with Calico DNS Inline Policy

Calico Enterprise lets users write network policies using domain names instead of IP addresses. This is done by dynamically mapping domain names to IP addresses and matching the egress traffic against these IPs. We have discussed this feature in detail when we introduced the Inline mode for the eBPF data plane in Calico Enterprise 3.20 release! It addresses the latency and performance issues of the various modes used by Calico in iptables/nftables data planes.