Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Zero Trust for IoT: Best Practices for Secure Device Access

IoT security has become a top priority in today’s hyper-connected world, where billions of devices—from sensors and cameras to industrial controllers—are linked across diverse networks. As organizations deploy more IoT devices to drive innovation and efficiency, they also introduce new security challenges that traditional security models are ill-equipped to address.

Alpha AI: The Apex of SOC Intelligence

Arctic Wolf is redefining cybersecurity with AI-powered innovations that help businesses stay ahead of evolving threats. By combining human expertise, the power of the Aurora Platform, and one of the industry’s largest security data sets, Alpha AI makes security simpler, faster, and more effective. Watch Dan Schiappa, President of Technology and Services, and Ian McShane, Vice President of Product, as they share how Arctic Wolf’s latest AI advancements are helping more than 10,000 organizations make security work.

From Cloud to AI: Innovation, Risk & Business Strategy #ai #podcast

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Stopping Cloud Breaches at Machine Speed: How CrowdStrike Uses Agentic AI to Power Cloud Detection and Response

Cloud is the new battleground, and more adversaries are joining the fight: New and unattributed cloud intrusions were up 26% in 2024, according to the CrowdStrike 2025 Global Threat Report. As adversaries accelerate cloud attacks, CrowdStrike delivers full-cycle agentic AI — from detection triage to threat response — giving defenders the edge to act at machine speed before adversaries can break through.

Announcing a Dedicated Snyk API & Web Infrastructure Instance for Asia-Pacific

Snyk is delighted to announce a significant milestone for our customers and partners in the Asia-Pacific (APAC) region: the launch of a dedicated Snyk API & Web infrastructure instance, which is now available and hosted locally within the region. This investment addresses the critical needs of our growing customer base in the region, ensuring that they can benefit from our modern, developer-first DAST capabilities while meeting local data residency and compliance requirements.

#220 - AI & automation for security operations w/ Filip Stojkovski, Staff Security Engineer at Snyk

On this episode of the Cybersecurity Defenders Podcast we speak with Filip Stojkovski, Staff Security Engineer at Snyk. Filip is a cybersecurity professional with over 15 years of experience. He began his career as a SOC analyst and now leads SecOps engineering at Snyk. Filip also advises organizations on SOAR, AI for SOC, and threat intelligence strategies.

Is your AI safe? Threat analysis of MCP (Model Context Protocol)

Unless you lived under a rock for the past several months or started a digital detox, you have probably encountered the MCP initials (Model Context Protocol). But what is MCP? Is this just a glorified API call, or is there really something there? This post thoroughly explains what MCP is and why it makes LLMs more powerful. It also provides a comprehensive threat model analysis and reviews the fundamental security vulnerabilities.

Generative AI Is Moving Fast. Are Your Security Practices Keeping Up?

We are in the middle of an AI gold rush. Generative AI (Gen AI) has exploded from research labs into everyday business workflows at breakneck speed. Marketing, software development, customer support, HR, companies across industries deploy Gen AI tools to boost efficiency, automate tasks, and gain an edge. But security trails behind. In the rush to innovate, organizations chase speed and visibility, leaving risk management behind.

1Password signs strategic collaboration agreement with AWS: New integration simplifies app and AI secrets management

1Password has signed a strategic collaboration agreement (SCA) with AWS to help modern enterprises close security blind spots, accelerate secure cloud adoption, and manage access in increasingly complex hybrid and AI-driven environments. This collaboration represents a long-term commitment to co-innovation, global growth, and enabling the adoption of AI tools, all while expanding support for the shared customers of 1Password and AWS.

1Password's new secrets syncing integration with AWS

A new integration between 1Password and AWS Secrets Manager makes it faster and easier to sync secrets across environments – all from within the 1Password desktop app. This update enables all 1Password and AWS Secrets Manager joint customers to simply and securely deliver secrets to AWS Secrets Manager. It’s the fast, familiar 1Password experience you know and trust – now extended to include environment variables and secrets support.