Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Keeper 101 - Enterprise: Keeper Endpoint Privilege Manager

Keeper’s Endpoint Privilege Manager is an advanced Privileged Elevation and Delegation Management solution that eliminates standing admin rights and provides just-in-time elevated access across your Windows, macOS, and Linux endpoints. This video will provide a simple walkthrough of the setup, deployment and utilization of Keeper Endpoint to significantly reduce the threat of ransomware, insider threats and data breaches – all without sacrificing productivity or performance.

The AI buzzword trap in compliance tools | Heard in the founder chat ft. Inflo's Tom Skelton

“AI-powered.” “AI-native.” “End-to-end AI.” At some point, it all sounds the same—but it’s not. In this “Heard in the Founder Group Chat” episode, Tom Skelton, Information Security and Technology Lead at Inflo, shares how to spot real AI that saves time (and risk)—and how to avoid platforms that just rebrand old features.

How Vancouver is shaping Canada's fintech future

Local founders say the country’s payments reboot and AI breakthroughs could put B.C. at the centre of financial innovation. One day before the Bank of Canada announced it had approved the country’s first payment service providers under the new Retail Payment Activities Act, leaders from Vancouver’s growing sector gathered for a conversation that felt prescient. At.

AI in Cybersecurity: How Smart Attacks Are Redefining Risk - and What Your Brand Must Do

In today’s fast-moving digital world, the adversary has evolved — threats aren’t just more frequent, they’re smarter. Artificial Intelligence (AI) is no longer only a force for good. Threat actors now leverage AI-driven methods to automate attacks, craft human-like deception, and exploit blind spots in organizations relying on outdated defenses.

Welcome to Agentic Park: What chaos theory teaches us about AI security

The first time it happened, nobody noticed. An automation reconciled a ledger, logged its success, and shut itself down. The token that made it possible looked harmless. Tidy, legacy, supposedly scoped “just enough.” But a week later, refunds ghosted, dashboards blinked, and audit logs told three different versions of the truth. And that token? Not a token at all. More like a Fabergé raptor egg sitting in a server room. Not decoration. Incubation. Of chaos.

Human Error is Still a Top Contributor to Cyberattacks

Human error remains the primary exploitation vector in mobile security incidents, according to Verizon’s latest Mobile Security Index (MSI). “At 44%, user behavior is the top cited breach contributor, just ahead of app threats, network threats, and internet threats, which were each cited by 43% of survey respondents,” the report says.

The Rapid Advancement of Malicious AI Is Changing Cyberdefense Forevermore

AI maturation is leading to more malicious hacking attacks. Like thousands of cybersecurity thought leaders, I’ve been speaking about AI being used maliciously since OpenAI released ChatGPT in November 2022. I’m far from alone. The entire cybersecurity industry has been warning about it nonstop. We’ve known that as AI progresses, attackers would use those same productivity features, thereby harming us.

Best Application Security Testing Services to Know

Application Security Testing (AST) services use automated tools and manual techniques to find and fix security vulnerabilities in software, integrating security into the entire development lifecycle (SDLC) to prevent threats and protect applications from attacks. Key services include Static Application Security Testing (SAST) for code-level analysis, Dynamic Application Security Testing (DAST) for runtime testing, and Interactive Application Security Testing (IAST) which combines both.

CrowdStrike Leads New Evolution of Security Automation with Charlotte Agentic SOAR

AI has transformed both how attackers operate and how defenders must respond. Today’s adversaries use AI to shift tactics in real time, forcing defenders to react at unprecedented speed. Many SOCs struggle to keep pace due to the limits of legacy automation. Even the most mature playbooks can’t anticipate every scenario or data variation, because playbooks are predictable — but adversaries aren’t.