Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

7 Steps to an Efficient Security Operations Center Design

In the original Star Trek television show, Captain Kirk would slightly recline in a command chair with various buttons that allowed him to deploy different technologies. Regardless of the alien threat, he had the necessary tools at his disposal to protect the Enterprise and his staff. An organization’s security operations center (SOC) acts as the Captain Kirk “command chair” for all security activities.

Keeper 101 - Enterprise: Keeper Endpoint Privilege Manager

Keeper’s Endpoint Privilege Manager is an advanced Privileged Elevation and Delegation Management solution that eliminates standing admin rights and provides just-in-time elevated access across your Windows, macOS, and Linux endpoints. This video will provide a simple walkthrough of the setup, deployment and utilization of Keeper Endpoint to significantly reduce the threat of ransomware, insider threats and data breaches – all without sacrificing productivity or performance.

The AI buzzword trap in compliance tools | Heard in the founder chat ft. Inflo's Tom Skelton

“AI-powered.” “AI-native.” “End-to-end AI.” At some point, it all sounds the same—but it’s not. In this “Heard in the Founder Group Chat” episode, Tom Skelton, Information Security and Technology Lead at Inflo, shares how to spot real AI that saves time (and risk)—and how to avoid platforms that just rebrand old features.

How Vancouver is shaping Canada's fintech future

Local founders say the country’s payments reboot and AI breakthroughs could put B.C. at the centre of financial innovation. One day before the Bank of Canada announced it had approved the country’s first payment service providers under the new Retail Payment Activities Act, leaders from Vancouver’s growing sector gathered for a conversation that felt prescient. At.

AI in Cybersecurity: How Smart Attacks Are Redefining Risk - and What Your Brand Must Do

In today’s fast-moving digital world, the adversary has evolved — threats aren’t just more frequent, they’re smarter. Artificial Intelligence (AI) is no longer only a force for good. Threat actors now leverage AI-driven methods to automate attacks, craft human-like deception, and exploit blind spots in organizations relying on outdated defenses.

Welcome to Agentic Park: What chaos theory teaches us about AI security

The first time it happened, nobody noticed. An automation reconciled a ledger, logged its success, and shut itself down. The token that made it possible looked harmless. Tidy, legacy, supposedly scoped “just enough.” But a week later, refunds ghosted, dashboards blinked, and audit logs told three different versions of the truth. And that token? Not a token at all. More like a Fabergé raptor egg sitting in a server room. Not decoration. Incubation. Of chaos.

Human Error is Still a Top Contributor to Cyberattacks

Human error remains the primary exploitation vector in mobile security incidents, according to Verizon’s latest Mobile Security Index (MSI). “At 44%, user behavior is the top cited breach contributor, just ahead of app threats, network threats, and internet threats, which were each cited by 43% of survey respondents,” the report says.

The Rapid Advancement of Malicious AI Is Changing Cyberdefense Forevermore

AI maturation is leading to more malicious hacking attacks. Like thousands of cybersecurity thought leaders, I’ve been speaking about AI being used maliciously since OpenAI released ChatGPT in November 2022. I’m far from alone. The entire cybersecurity industry has been warning about it nonstop. We’ve known that as AI progresses, attackers would use those same productivity features, thereby harming us.