Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why banks are adopting blockchain infrastructure now

Fireblocks now supports 95 banks globally, and the adoption curve is accelerating. In this clip from the Banking Bootcamp, Financial Markets Economist Neil Chopra explains what's driving the shift: regulatory clarity, proven utility, and infrastructure that plugs into how banks already operate. This is Episode 1 of the Banking Bootcamp, a three-part series produced in partnership with American Banker.

AI SOC Metrics That Actually Matter: How to Measure Whether AI Is Working in Your SOC

Every security vendor shipping an AI product in 2026 makes the same promises. Faster triage. Shorter response times. Fewer false positives. Reclaimed analyst hours. But, six months after deployment, most security leaders still cannot answer a straightforward question from the board: Is this thing actually working?

You Can't Secure AI Agents You Haven't Found

Most organizations have a reasonable handle on their sanctioned SaaS apps. Model Context Protocol - hit 10,000 public servers within a year of launch, with 97 million monthly SDK downloads. None of those numbers capture the servers your developers configured locally. Those don't appear in any registry. They were added at the IDE level, one developer at a time, with no approval step and nothing that touches a central system. That's the inventory problem. It comes before any question of enforcement.

Bugs Hide in Plain Sight When Nobody Gets Paid #security #bugbounty

The old belief that open source means every bug gets spotted quickly falls apart when nobody is truly looking and nobody works for free. If a flaw offers no bounty, no commercial reward and little public attention, it may sit quietly for years while everyone assumes someone else checked it.

This Is How Red Teams Actually Use AI Security Data #aisecurity #redteam #threatintelligence

The volume of AI security research is now too high for any human to track properly by hand. The practical answer is using AI to filter AI, reducing hundreds of articles and reports into a daily shortlist so analysts spend their time on signal instead of noise.

Types of AI agents: From simple reflex to autonomous systems

AI agents fall into five foundational categories: simple reflex, model-based reflex, goal-based, utility-based, and learning agents. Each is defined by how much environmental awareness and decision-making complexity the system can handle, from fixed condition-action rules to feedback-driven self-improvement.

"Just looking at code and finding vulnerabilities is not going to stop breaches."

CrowdStrike CEO and Founder George Kurtz discusses with Dan Ives of Wedbush Securities why frontier AI models won’t replace cybersecurity platforms: stopping breaches requires proprietary data, real-time decisions, enterprise-grade support and the ability to act in milliseconds.

Federated Search: Access Data Beyond Your SIEM-Instantly

See how CrowdStrike Falcon Next-Gen SIEM Federated Search enables security teams to access and query data beyond the SIEM—instantly, and without rehydration. In this demo, you’ll learn how to search data directly where it lives, including external sources like Amazon S3, Falcon LogScale, and NDR platforms, using a single query language.