Featured Videos


Threat Modeling the AI Agent: Architecture, Threats & Monitoring
Nov 11, 2025
•
Mohan Kumar, Box


AI Agents for SOC: Hype Curve vs. Measurable ROI
Oct 28, 2025
•
Edward Wu, Dropzone


Can You Build an AI SOC with Claude Code? The Reality vs. Hype
Oct 21, 2025
•
Ariful Huq, Exaforce



Incident Response of Kubernetes and how to Automate Containment
Oct 10, 2025
•
Damien Burks, Senior Security engineer


The Truth About AI in the SOC: From Alert Fatigue to Detection Engineering
Oct 3, 2025
•
Allie Mellen, Forrestor Research


Why Siloed Security Fails in the Cloud: A New Horizontal Approach
Sep 25, 2025
•
Micki Boland, Eyal Golombek


The Security Gaps in AWS Bedrock & Azure AI You Need to Know
Sep 23, 2025
•
Kyler Middleton, Sai Gunaranjan, Veradigm


Fixing Version Matching with a Risk-Based Approach to SCA in the AI Era
Sep 18, 2025
•
Roy Gottlieb, Hopper Security


The Evolution of Email Security: From Pre-Breach to Post-Breach Protection
Sep 16, 2025
•
Rajan Kapoor, Material Security



.jpg)


















.jpg)
.jpg)












.png)















.png)









.png)

