Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Hidden Stress of Being a SOC Analyst. Nobody Talks About This

"You feel the weight of the organization on you" - Grant Oviatt reveals the emotional reality of being a SOC analyst that nobody talks about. When you find something bad, there's that panic moment of "what do I do?" while knowing the entire organization depends on your response speed. This is why AI agents providing instant remediation actions can be a game-changer for analyst mental health and response times.

Client-Side Exploitation Attack Path

Client-side exploit delivery methods like malicious documents or browser-based attacks are among the most common ways adversaries gain initial access. But without visibility into these entry points, many attack paths go undetected. This demo shows how Falcon Exposure Management identifies and maps attack paths that begin with client-side exploitation. By combining exploit visibility with real network context and asset criticality, security teams can uncover hidden lateral movement risks and take action fast.

API Attacks - The Hidden Threat to Your Digital Ecosystem

APIs are the connective tissue of the digital economy, silently enabling transactions, data exchanges, and automation across industries. Yet, as businesses rush to integrate APIs into every aspect of their operations, they often overlook a significant reality: APIs are rapidly becoming the most targeted attack vector in cybersecurity.

Password Management Best Practices for Employees

Weak employee passwords create significant security risks. According to Keeper Security’s Password Management Report, 34% of users reuse variations of strong passwords, which leaves systems vulnerable. Employees who reuse strong passwords – even with slight modifications – can jeopardize the security of sensitive data. To reduce risk, employees should develop smart habits to improve their password hygiene and minimize human error.

Protect AI-power apps with Cloudflare Firewall for AI

As organizations refactor applications and adopt AI and Large Language Models (LLMs) to power new applications and enhance existing services, a new class of security vulnerabilities has emerged. Traditional web application firewalls (WAFs) are only partially equipped to defend against threats unique to AI. In this video, we provide an overview of Cloudflare's Firewall for AI product, how it works, and how you can use it to protect AI models and safeguard user interactions with those models.

7 Best Practices for eCommerce Fraud Prevention

When it comes to the stress of dealing with eCommerce scams, digital business teams don’t need reminding. But the current and projected cost of eCommerce fraud is truly staggering. A study by Juniper Research, a leader in fintech insights, forecasts that eCommerce fraud is set to leap from $44.3 billion in 2024 to $107 billion by 2029. That’s stomach-churning 141% jump. Needless to say, eCommerce fraud prevention has never been a more pressing goal.

6 Core Components of an Alertless SOC Security Teams Should Know

The traditional approach to managing security operations centers (SOCs) is straining the mental and physical reserves of even the most skilled security analysts—while also failing to provide the protection organizations need against today’s threats. Analysts are left to respond to a never-ending stream of alerts, resulting in an overwhelming, reactive cycle that stifles proactive investigation and threat hunting.

Thoughts from Stablecon 2025: Stablecoins at an Inflection Point

This year at Stablecon 2025, I had the privilege of delivering the opening keynote on behalf of Fireblocks. We supported the inaugural event as title sponsor because we believe stablecoins are reaching a pivotal moment—and this gathering marked an important step toward shaping the conversations that will define the space. For us, it was also a moment to take stock of how far the ecosystem has come—and the role Fireblocks continues to play at the center of it.