Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Exploiting API4 - 8 Real-World Unrestricted Resource Consumption Attack Scenarios (and How to Stop Them)

Unrestricted Resource Consumption (API4:2023) is the only threat category in the OWASP API Security Top 10 explicitly dedicated to Denial of Service (DoS) and resource abuse. But despite being just one category, attackers can exploit it in many different ways; from large file uploads and expensive GraphQL queries to abuse of metered third-party services like SMS gateways or AI/LLM APIs.

Introducing the Arctic Wolf AI Security Assistant: Providing Value for Security Operations for Beta Customers

Arctic Wolf recently introduced its AI Security Assistant, a cutting-edge generative AI security assistant designed to enhance security operations within the Aurora Platform. This innovative tool is now in beta and promises to deliver deeper security expertise instantly to users.

Modern Access Control in the Public Sector: A CISO's Perspective

Hear from Keeper Security’s Chief Information Security Officer, Shane Barney, for an exclusive, interview-style webinar addressing the most pressing questions around secrets management and Privileged Access Management (PAM) in today’s public sector IT landscape.

GitGuardian Remediation Guide - From Alert to Resolution

In this video, Dwayne McDaniel, Developer Advocate at GitGuardian, walks you through the workflow security and DevOps teams can follow to investigate and remediate a secret leak using the GitGuardian platform. Whether it’s an exposed API key, token, or internal credential, GitGuardian helps you go from alert to resolution with confidence.

Inside Bug Bounty Programs: How Hackers Help Secure Your Software | Secrets of AppSec Champions

Bug bounty programs are more than just rewards for hackers—they’re a gateway to stronger security, global collaboration, and even career transformation. In this episode, Netta Oren, cybersecurity manager and seasoned bug bounty advocate, shares how organizations can build successful bounty programs, responsibly manage disclosures, and create a win-win culture for both companies and ethical hackers.