Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Reviewing Malicious PRs at Scale with AI

As AI coding assistants accelerate software development, the volume of pull requests at Datadog has grown to nearly 10,000 per week, increasing the risk that malicious changes slip through due to review fatigue. To address this, Datadog built BewAIre, an LLM-powered code review system designed to identify malicious source code changes introduced by threat actors. By reducing approval fatigue for developers while increasing friction for attackers, BewAIre guides human reviewers to the areas where judgment matters most, without slowing developer velocity.

Your Backups Know More Than You Think

You may not be aware of how valuable your backups are: they can contain extremely valuable information that leaves a record of what your other security tools may have missed. This is just one of the many interesting tidbits Kyle Fiehler provided on his recent episode of Data Security Decoded. Kyle also explains how threat actors exploit backup blind spots, why identity and recovery are now prime attack surfaces, and how security leaders can rethink MTTR.

How to Set Up 2FA for Jira Service Management Portal Customers | miniOrange

Looking to enforce Two-Factor Authentication (2FA) for your JSM portal-only customers? In this video, we walk you through the complete setup of 2FA settings using the miniOrange Cloud 2FA app for Jira Service Management (JSM), covering admin configuration, customer management, and the end customer enrollment flow. What you will learn in this video Timestamps Enforcing Two-Factor Authentication on your JSM portal with miniOrange helps organizations.

OverWatch for Defender

Standardized on Microsoft Defender but want the power of CrowdStrike’s elite threat hunters? Now you can have both Meet CrowdStrike Falcon OverWatch for Defender: 24/7 threat hunting focused on what automation misses Real-time detection and response to sophisticated threats Deeper visibility without changing your existing deployment You keep Defender. You gain a team hunting for the activity hiding in plain sight.

The Terrorist Designation: A New Red Line for Ransomware with Cynthia Kaiser

In this episode, host ⁠Caleb Tolin⁠ explores the battlefield of enterprise defense, which has moved from simple data theft to ultra heinous crimes that put patient outcomes at risk. Guest ⁠Cynthia Kaiser⁠ shares Battlefield Stories from her time at the FBI and her current work as SVP of the Ransomware Research Center at ⁠Halcyon⁠ (@halcyonsecurity ) illustrating how the industrialization of cybercrime has reached a tipping point. They dive into the alarming reality of modern dwell times, specifically looking at how groups like Akira move from initial access to full encryption in as little as one hour.

Logs & Lattes: Episode 6 - How Small SOC Teams Stop Drowning in Alerts

Lean security teams don't need a smaller version of an enterprise SOC. They need a different approach entirely. Graylog Director of Product Management, Rich Murphy, joins Logs and Lattes to explain why 2-to-4-person security teams are the most underserved segment in cybersecurity and what needs to change.

Navigating With GitGuardian Workspace Quick Access

GitGuardian Workspace Quick Access helps you move through the platform faster with one unified search experience. In this video, we walk through how to open Quick Access with Ctrl+K, or Cmd+K on Mac, search across platform pages and public documentation, navigate results with keyboard shortcuts, and jump directly to the section you need. Quick Access respects your permissions and workspace configuration, so results stay relevant to the pages, features, and docs available to you.