Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing REACT: Why We Built an Elite Incident Response Team

Cloudforce One’s mission is to help defend the Internet. In Q2’25 alone, Cloudflare stopped an average of 190 billion cyber threats every single day. But real-world customer experiences showed us that stopping attacks at the edge isn’t always enough. We saw ransomware disrupt financial operations, data breaches cripple real estate firms, and misconfigurations cause major data losses. In each case, the real damage occurred inside networks.

CVE-2024-36401 - GeoServer - tailoring a public PoC to enable at-scale high-confidence detection

At Bitsight, one of the responsibilities of the Vulnerability Research team is to develop fingerprinting methods to not only identify exposed services, but also vulnerabilities in those services. When it comes to detecting vulnerabilities, there are increased challenges depending on the complexity of both the vulnerability and the vulnerable service.

SIEM's Next Chapter: Evolving, Not Dying

The obituary for SIEM has been written more than once. The latest headline from Dark Reading calls it “dying a slow death.” Catchy. But wrong. If you work in a SOC, you already know the need for centralized, contextualized visibility is not going anywhere. What is changing the future of SIEM, is how SIEM delivers it. If you are still thinking of SIEM as a clunky, high-cost log hoarder, you are stuck in the wrong decade.

Advanced SOC 2 Mistakes Even Mature Companies Make

Even the most mature organizations can stumble when it comes to SOC 2 compliance. In this video, we uncover the critical SOC 2 mistakes that even experienced teams make. Did You Know? Over 68% of companies fail their first SOC 2 audit due to documentation or evidence gaps. 46% of recurring SOC 2 issues stem from poor control mapping and risk assessment misalignment. If your business handles customer data, this video is essential to ensure you stay audit-ready, trustworthy, and compliant with AICPA’s Trust Service Criteria.

Identity automation in the age of agentic AI with Matthew Chiodi

Defender Fridays - Identity Automation in the Age of Agentic AI with Matthew Chiodi Join us for this session of Defender Fridays as we explore identity automation in the age of agentic AI with Matthew Chiodi, Chief Strategy Officer at Cerby. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

We need to redefine "critical infrastructure" #cybersecurity #ransomware #criticalinfrastructure

When a city gets hit with ransomware, residents can't pay utility bills, access emergency services, or even get married. When the water treatment plant goes down, the hospital can't operate, no matter how well you've secured it. We've been asking the wrong question. Instead of "does this technically qualify as critical infrastructure?" we should be asking "who needs help?" Small organizations like schools, nonprofits, water systems, and local governments face the same cybersecurity challenges but lack the resources to defend themselves.

A CISO's Guide to API Security

APIs are powering digital transformation but also exposing organizations to new risks. Securing them requires collaboration between CISOs, CIOs, and the board. This webinar will demystify the evolving API threat landscape, outline governance strategies, and provide leaders with the tools to communicate API risk in business terms. Key Learnings: Why You Should Attend.

IAM Principal Consultant & Head of Center of Excellence One Identity - iC Consult

iC Consult’s partnership with One Identity has gone back a long time, thanks to the comprehensive One Identity portfolio of unified IAM solutions. Join Oliver Paulzen to explore the advantages of the iC Consult-One Identity partnership and the benefits of the integrated solutions that make up the One Identity Fabric.

Give First: Shifting to an Abundance Mindset in IT with Venture Capital Legend Brad Feld

In this installment of Make Work Happen, we're joined by Brad Feld, partner at Foundry Group, to dive into the powerful "Give First" philosophy that has shaped the Boulder startup community for decades. Brad discusses his career, from starting his first company 40 years ago to co-founding Foundry Group and Techstars. We explore how core values, or cultural norms, like non-transactional, positive-sum, multi-turn relationships, can define the success of a business or a community.

A step-by-step guide to AI security assessments [With a template]

As artificial intelligence becomes deeply integrated into business operations, organizations have started feeling the pressure to keep up. According to Vanta’s 2025 survey, more than 50% of the organizations report being overwhelmed by the speed of AI adoption and growing compliance obligations. ‍ This issue is aggravated by the fact that AI tools evolve faster than governance policies can adapt, potentially leaving complex gaps for security teams to fill.