Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding how attackers think & how you avoid threats with Terry Bradley, Mile High Cyber [311]

Terry Bradley, Founder and President of Mile High Cyber, shares how you can uncover vulnerabilities and strengthen your organization's defenses with expert penetration testing and security assessments.

Build a security investigation agent that responds to detections (agent-as-code)

In this video we demonstrate how to build a custom security investigation agent using LimaCharlie’s agentic SecOps platform. Using the AI Agent Builder and a plain-language prompt, we create an investigation bot called SSH Bot that runs automatically whenever sensitive SSH credential material is accessed on an endpoint. When the detection fires, the agent: The agent is saved as code, allowing it to be triggered by detections, run asynchronously across infrastructure, or executed on a schedule.

GitHub Token Recycing #github #tokenrecycling #tokens

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

SBOMs That Actually Matter

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Gather & add correlated searches in Splunk Enterprise Security to Drata

Tired of manually exporting Splunk correlated search data into your compliance tools? This 5-minute flow from the Tines story library automatically queries Splunk Enterprise Security's notable index, polls for results, and uploads them directly as external evidence to your Drata security controls.

Ep 38: Wheels up, systems down: cybersecurity at cruising altitude

In this episode of Masters of Data, we buckle up and explore the staggering technological complexity behind the airline industry, from managing IoT devices across global fleets to navigating the data chaos of mergers and acquisitions. We dig into the delicate balance airlines strike between aging legacy systems and risky upgrades, and why getting that wrong isn't just costly but potentially catastrophic. We also look at how forward-thinking airlines are turning operational logs into real business wins, all while safeguarding the mountains of sensitive passenger data they collect every day.

Understanding Cloudflare's network architecture

For decades, enterprise IT relied on a “hub and spoke” security model. But between the explosion of cloud infrastructure, SaaS apps and a remote workforce, that old perimeter hasn't just cracked—it’s shattered. In an attempt to stay on top of the advancing perimeter, many different solutions from many vendors entered the market and created a "spaghetti mess" of point solutions that drive up costs and tank user experience. Cloudflare is an answer to this problem, delivering everything you need to secure your apps, networks, users, data and devices.