Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

You Won't Believe These Results from Replit

In this video, we put Replit’s AI coding tool to the test by asking it to create a secure note-taking app. While the tool shows off some seriously impressive abilities, it’s not without its flaws... Join me as I explore what Replit can (and can’t) do, and whether AI coding tools such as this one are ready to build reliable, secure apps.

Why Your SOC Needs XDR to Automate Threat Detection and Containment

Your SOC scrambles when alerts flood in: disparate tools, manual triage, and slow follow-through mean attackers move faster than your defenses. That gap from detection to containment stretches dwell time, increases breach impact, and drains your team. Manual tasks consume your most valuable resource—analyst attention—while every second matters in incident response.

Working With GitGuardian Playbooks To Automate Your Workflows

In this video, we'll cover GitGuardian Playbooks and how to manage them in your workspace. We know that time is critical when a secrets incident occurs. That's why our platform allows you to quickly and easily automate steps of the incident response process. We call these automations "Playbooks".

Drupal Single Sign On - Azure AD (Microsoft Entra ID) as IDP

This video will walk you through the steps required to configure Azure AD (Microsoft Entra ID) as an Identity Provider and Drupal as a Service Provider. The module allows users to log in to the Drupal site using their Azure AD (Microsoft Entra ID) account. Chapters: Don't forget to subscribe to our channel and click on the bell icon to get notifications about new uploads.

CrowdStrike to Acquire Pangea to Secure Enterprise AI Use and Development

Today, at Fal.Con 2025, I am delighted to announce CrowdStrike’s intent to acquire AI security leader Pangea. With this acquisition, CrowdStrike will pioneer the category of AI detection and response (AIDR) as we secure enterprise AI development and use across the data, models, agents, identities, infrastructure, and interactions making up the AI lifecycle.

Speaking Different Languages: How to Align Dev and Sec Teams Effectively

Security issues in software development often stem not from developers’ lack of concern but from a fundamental disconnect between development and security teams. Each wants to do their job well, but their goals and expectations frequently conflict. This misalignment costs organizations in heightened security risks and tangible operational setbacks. Security issues identified too late in the cycle delay releases and increase project costs.

The Psychological Toll of Cybersecurity: You Can't Unsee It

Out on 17th September! Some trauma doesn’t come from what happens to you — but from what you witness online. In this powerful episode preview, Eve Parmiter shares raw insight into the mental health challenges facing cybersecurity professionals exposed to extreme, distressing or graphic material in their work. From secondary trauma to organisational neglect, we explore why the industry needs better language, better support, and far less stigma.#CyberSecurity.