Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Spotlight on our Founder & CEO, Mr. Anirban Mukherji's interview byte at ETCISO IDAM Summit 2026!

Our Founder & CEO Mr. Anirban Mukherji recently spoke at the ETCISO IDAM Summit 2026 in Mumbai, addressing the challenge of selecting the best vendors among many. He highlighted the importance of robust identity and access management solutions for both human and agent identities. Watch this complete video to know more!

Scan and Secure Data with DLP Scanner and Cloud Migration Assistant for Confluence | miniOrange

Need to detect, encrypt, and redact sensitive data in your Confluence instance before migrating to the cloud? In this video, we walk you through the Data Security Analysis and Attachment Scanning features of the miniOrange DLP Data Scanner and Migration Assistant for Confluence. Learn how to configure custom regex rules, scan your Confluence pages for sensitive data violations like exposed IP addresses, encrypt or redact sensitive content, scan attachments across spaces, and review your Migration Readiness Score.

Session on How much of Mythos based attacks can you prevent using modern IDAM techniques?

In this session at ETCISO IDAM Summit 2026, our Founder & CEO Mr. Anirban Mukherji discussed Identity Access Management (IAM), data protection challenges, and AI governance for modern organizations. He covers SSO, MFA, legacy system hurdles, DBT data flows, Shadow AI risks, and practical steps like patch automation, least privilege access, and AI agent controls. Drawing from the Abhimanyu Chakravyuh metaphor, he explains how strong IAM contains breaches. Learn about vendor sovereignty, geopolitical risks, and miniOrange's expertise in IAM, AI security, and privacy.

Ep. 58 - Double Dragon: How China's APT 41 Works for the State by Day - and Itself by Night

China's cyber shadow has already reached your software. APT 41 — known as Double Dragon — isn't just stealing state secrets. They've pioneered a new generation of supply chain attacks, trojanizing the shared code libraries that thousands of organizations trust without question. And their latest splinter unit, UAT 7290, has been inside North American developer environments for over a year — not triggering anything, just watching, learning, and waiting to strike in a way that looks completely native.

Atlassian Team '26: The Conversations That Told Us Where Enterprise Identity Is Headed

We just got back from Atlassian Team '26 in Anaheim. Three days, thousands of attendees, and Atlassian's biggest push yet toward human-AI collaboration. The Founder Keynote set the tone, Rovo agents got smarter, and the Teamwork Collection took center stage. It was a packed, high-energy week. But the most interesting part of our three days wasn't on stage. It was at Booth.

Falcon AIDR Detects Threats at the Prompt Layer in Kubernetes AI Applications

AI is introducing a new class of threats that don’t look like traditional attacks and can’t be detected with conventional tools. The AI applications that organizations deploy in the cloud interact with large language models (LLMs) through prompts and responses. This prompt layer has emerged as a new attack surface, where risks like prompt injection and sensitive data leakage can go unnoticed.

Frontier AI and the Demise of Hardware Security

The cybersecurity industry has long relied on a simple idea: find vulnerabilities, patch them, and measure success by how fast you close the gap. “Time-to-patch” became a badge of honor. That model no longer holds. The rise of Mythos-class Frontier AI Models introduces a different kind of threat. AI-driven, agentic attacks operate continuously, discover weaknesses automatically, and execute at a scale no human team can match.

UAE breach attempts, dupe ransomware, PAN-OS vulnerability & Microsoft's Phone Link attack [321]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

By AI, With AI, For AI: Building IT services in the AI-first era

MSPs want to grow. Yet the cost of growth keeps eating the margin that extra growth was supposed to deliver. Traditionally, more customers means more endpoints, more tools, more alerts, more billing entities, more compliance frameworks. Headcount scales with the work, but margins don't seem to keep up. That problem has a new shape now. AI is changing how every IT environment is built, run and protected and the speed at which they are done.