Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hiring fraud and deepfakes with Tom Cross

Join us for this week's Defender Fridays as we explore the evolving threat of deepfakes in hiring and remote work with Tom Cross, Head of Threat Research at GetReal Security. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

How to choose the right AI standard: A 7-point guide

AI adoption has accelerated across sectors today as the technology becomes easier to access and deploy. Most organizations embed it in at least one aspect of their daily operations, but doing so has also introduced new risks, such as model bias and outcome drift. ‍ There’s a growing gap between AI use and responsible oversight, and keeping up demonstrable AI governance practices is a challenge.

How to Protect Your AI Agents from Invisible Risks? | IdentityShield '26

AI agents power innovation but face hidden hacks, leaks, and tricks. This session uncovers 7 key risks, like cyberattacks, insider threats, bias abuse, and rogue actions, with best practices and real demo videos. Speaker: Vipika Kotangale Technical Content Writer, miniOrange Pune, India.

Getting started with Source Code Reviews | IdentityShield '26

Secure coding starts with deeply understanding code and vulnerabilities, and secure code reviews are crucial in finding issues early. In this hands-on secure code review workshop, we will teach the participants how to perform effective code reviews with both manual and automated techniques. Speaker: Prateek Thakare Senior Security Engineer, GoDaddy Bengaluru, India& Gaurav Bhosale Senior Application Security Engineer | Ex-10xbanking, Mastercard, Payatu Indore, India.

8 Little-Known Facts About Managed Detection and Response (MDR)

Managed Detection and Response (MDR) is a security service that has become a cornerstone of modern cybersecurity strategies. It’s designed to provide 24/7 threat monitoring, detection, and response capabilities, especially for organizations that lack the resources for an in-house security operations center (SOC). But while many have heard of MDR, there are still some common misconceptions and little-known facts about this powerful service.

Essential Security Culture Behaviors

In the dynamic digital landscape of 2026, technology alone is no longer the impenetrable shield it once promised to be. The most sophisticated firewalls and advanced threat detection systems can be rendered obsolete by a single, well-executed human exploit. This reality underscores a critical shift: the paramount importance of security culture.

What's the first security tool your small business should buy?

Small business (SMB) cybersecurity has never been simple, but it’s become even more complex in recent years. Today’s businesses have to deal with an ever-growing number of apps and tools to secure, and this complexity is naturally going to be far harder for small teams to manage. Particularly for very small businesses.