KubeCon + CloudNativeCon North America 2025 — Must-See Sessions
KubeCon + CloudNativeCon North America 2025 is almost here, and whether you’re a cloud-native newcomer, seasoned SRE, or Kubernetes...
KubeCon + CloudNativeCon North America 2025 is almost here, and whether you’re a cloud-native newcomer, seasoned SRE, or Kubernetes...
SESSIONSession 2A: LLM Security Authors, Creators & Presenters: Yichen Gong (Tsinghua University), Delong Ran (Tsinghua University), Xinlei He (Hong...
Sydney – October 28, 2025 – Kasada, the trusted provider of advanced bot defense for the world’s most targeted brands,...
November 5, 2025 Adam King In a world where data breaches continue to rise, organisations have become more discerning...
A severe vulnerability was discovered in the React Native Community CLI, a popular open-source package downloaded nearly two million...
Those who follow the DNS abuse landscape closely may have noticed a rise in activity and abuse reports related...
Tenable Research has discovered seven vulnerabilities and attack techniques in ChatGPT, including unique indirect prompt injections, exfiltration of personal...
What is the CAIF? The Centraleyes AI Framework (CAIF) is a comprehensive compliance and governance tool designed to help...
Understanding Enterprise Product Security Requirements Okay, so you're building a saas product and thinking, "security? later!". Big mistake. Enterprises...
Can Understanding Non-Human Identities (NHIs) Really Help Relieve Cloud Compliance Stress? Navigating the complexities of cloud compliance can often...
How Can Smart NHI Management Enhance Cybersecurity? Managing Non-Human Identities (NHIs) may seem like an abstract task, yet its...
Are Your Machine Identities Truly Secure in the Cloud Ecosystem? With organizations strive to protect their digital assets, one...
SESSION Session 1D: System-Level Security Authors, Creators & Presenters: Shixin Song (Massachusetts Institute of Technology), Joseph Zhang (Massachusetts Institute...
November 4, 2025 From PDFs to PowerPoints, the formats we rely on daily are also the ones attackers use...
As October 2025 wraps up, Sonrai’s latest analysis of Google Cloud Platform permissions reveals both newly introduced privileged actions...