Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

WatchGuard: Live Webinar XDR vs. SIEM: Defeating Cyber Chaos

Cybersecurity decision-makers face a growing challenge: defending against a rising tide of threats without drowning in operational complexity. Designed for large security teams, SIEM platforms often introduce more chaos than clarity, burdening small teams with high costs, complex deployments, and overwhelming data. In this webinar, Stephen Helm and Ricardo Arroyo will discuss the core differences between SIEM and XDR (Extended Detection and Response) and explain why XDR is emerging as the smart, scalable choice for modern MSPs and lean IT security teams.

Tigera: Workshop: Enhancing Kubernetes Security with Calico Open Source 3.30

Unlock the full potential of network security within your Kubernetes environment with Calico Open Source 3.30 and Whisker. This workshop will delve into the advanced aspects of policy management, focusing on how staged policies and policy tiers can enhance your network security. You'll gain hands-on experience in verifying policy effectiveness and implementing robust, layered network controls.

Tigera: Workshop: Managing North/South Traffic in Kubernetes with Calico

Effectively managing external traffic to and from your Kubernetes cluster, often called "North/South" traffic, is crucial for both performance and security. This workshop will provide a comprehensive look at how to control this vital traffic flow using Calico. You'll learn how to manage inbound traffic with the powerful Calico Ingress Gateway and secure outbound access with Calico's robust egress controls that include Calico Egress Gateway.

Tigera: Calico Demo: Securing Outbound Kubernetes Traffic with Calico Egress Gateway

Gaining granular control over outbound traffic from your Kubernetes cluster is essential for security and compliance. Join us for a demo on the Calico Egress Gateway, a powerful feature available in Calico's commercial editions. You'll discover how to manage, secure, and monitor all your outbound connections.

Tigera: Beyond Features: How Calico Delivers Business Value in Kubernetes

As Kubernetes adoption grows, so do the challenges of managing multiple tools, distributions, and environments. Join us for a walkthrough of how Calico's unified platform brings networking, network security, and observability together to reduce complexity, improve agility, and drive measurable business impact.

The Howler Episode 20: Matt Bykowski, SVP Global Acquisition Sales

This month, we sit down with Matt Bykowski, Senior Vice President of Global Acquisition Sales, as he shares how he works to enable & empower his team, learnings from leading an increasingly global team, his thoughts on the transition from high performer to people leader, and so much more! Matt Bykowski is a dynamic sales leader with over 15 years of experience driving growth in the technology sector.

Best AI Red Teaming Services: Top 6 Platforms and Services in 2025

AI red teaming services involve security assessments focused on artificial intelligence systems. Unlike traditional red teaming, which targets general IT infrastructure, AI red teaming targets the unique attack surfaces and risks associated with AI, large language models (LLMs), and machine learning deployments. These services simulate adversarial attacks, probing for vulnerabilities like prompt injection, data leakage, bias, and malicious manipulation.

Enhancing Endpoint Visibility Through a Unified Security Approach

It’s easy to miss critical signs when endpoint tools work in isolation. When a laptop shows unusual behavior but its network or cloud interactions are invisible, early compromise can go undetected. By bringing together endpoint detection and response (EDR), network telemetry, and cloud context under a unified security approach, teams gain the full picture needed to spot threats quickly.

DIST Cyber Security Sectoral Analysis 2025 - A roadmap for navigating cybersecurity in the UK

The DIST Cyber Security Sectoral Analysis 2025 provides valuable insight and advice for navigating cybersecurity threats in the UK. It emphasises that the cybersecurity industry must innovate and adapt continually to address new and emerging technologies, along with wide range of complex cybersecurity threats. The latest sectoral analyses highlighted that cybersecurity is a booming and dynamic industry in the UK, and it thrives on innovation, regulatory evolution and strategic collaboration.