Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Vulnerability Impact Translation with Falcon Exposure Management

This demo shows how Charlotte AI transforms raw vulnerability data from Falcon Exposure Management into a CISO-ready report. By pulling enriched insights from Next-Gen SIEM—like ExPRT.AI scores and asset criticality—the workflow translates technical signals into business risk. The result: a clear, automated email that highlights key trends, impacted systems, and actionable remediation paths. CrowdStrike Exposure Management.

Stop Ransomware Over SMB with Falcon Endpoint Security: Demo Drill Down

Ransomware is evolving—and it's targeting your blind spots. Attackers now encrypt files remotely over SMB shares using stolen credentials and unmanaged systems, bypassing traditional defenses. CrowdStrike closes this gap with File System Containment, a powerful Falcon Endpoint Security feature that detects ransomware-style behaviors like mass encryption and blocks destructive file actions instantly—directly at the endpoint, without relying on cloud checks or process termination.

How to Optimize DevSecOps Workflows Using JFrog

Embedding security within the Software Development Life Cycle (SDLC) is no longer just a best practice; it’s a full-on necessity. DevSecOps extends the DevOps model by making security a shared responsibility from the earliest stages of development. Today’s enterprises require this kind of integrated approach to streamline workflows from development to deployment.

Pegasus Spyware Email Scam: How to Detect and Protect Yourself

Among today's rising cyber threats, Pegasus spyware email has become one of the most famous names among the latest threats. Pegasus is a malware spy tool developed for extensive surveillance but has now been turned into the new wave of scams exerted by cybercriminals, especially through Pegasus spyware scam mails used to extort money from victims, claiming their devices had been hacked.

CompassDRP Social Media integration: Six real-world use cases

Social media can work both for and against an organization, so it’s worth treating these sites as extensions of your attack surface. CompassDRP’s Social Media integration continuously monitors both corporate and employee profiles across platforms such as Twitter, LinkedIn, and Facebook. It automatically flags unauthorized or impersonating accounts that mimic executive identities or misuse company branding, helping to thwart phishing and fraud campaigns before they gain traction.

Introducing Full Workload Inventory Visibility in ARMO: See What's Running, What It's Doing, and How It's Protected

At ARMO, our mission is to make Kubernetes security more accessible, actionable, and effective. That’s why we’re excited to launch a major upgrade to our platform: Full Workload Inventory Visibility. This powerful new capability helps security and platform teams answer the question at the core of Kubernetes security.

EP 11 - The calm CISO: Strength under pressure

What does it take to stay calm in the face of constant cyber pressure—and why does that mindset matter more than ever? In this episode of Security Matters, host David Puner speaks with Den Jones, founder and CEO of 909Cyber, about his transition from enterprise chief security officer (CSO) to cybersecurity consultant.

Addressing Recent Vulnerabilities and Our Commitment to Security

At CyberArk, the trust and security of our customers are at the heart of everything we do. Today, July 15th, we are addressing the publication of several Common Vulnerabilities and Exposures (CVEs) related to CyberArk Secrets Manager, Self-Hosted (formerly Conjur Enterprise) and Conjur Open Source (OSS). We regret the challenges this situation may pose to our customers and reaffirm our commitment to supporting them through the resolution process.