Security
Security Insights
Filter by Content Types
- No options
1050 results found
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Aug 21, 2025 • 10am
Hands-On Lab Workshop: Juiced Shop, OWASP
Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Juiced Shop Lab. This workshop is designed to introduce fundamental concepts of web application security testing through our CTF mini-games series, JuicedShop. After the live lab, you'll have a better understanding of how to use Burp Suite and will be able to apply those skills to more challenges in our JuicedShop series. This one-hour event is limited to a small group of participants who will have the opportunity to engage in Q&A during the session. Attendees are encouraged to actively participate by launching the lab themselves alongside the presenter for a hands-on experience.
Webinar
•Jul 24, 2025 • 11am
Hands-On Lab Workshop: Cyera Foundations
Join us for the Virtual Lab Workshop! During this exclusive session, the hostwill introduce the Cyera Foundations Lab and Cyera Data Security Platform learning path. This workshop is designed to provide an environment to gain hands-on experience with the fundamental features of Cyera. This one-hour event is limited to a small group of participants who will have the opportunity to engage in Q&A during the session. Attendees are encouraged to actively participate by launching the lab themselves alongside the presenter for a hands-on experience.
Webinar
•Jul 17, 2025 • 11am
🚩Disarm Me CTF: Hack, Decrypt, Disable — Featuring Willa
Updated calendar appointments were sent due to a correction in the scheduled time—and it's a win for everyone. Based on player feedback, we've extended the session to 8 hours to give teams enough time to compete, collaborate, and complete all challenges.
While speed still counts (with First to Finish up for grabs), we know some teams want time to dig deeper. Whether you wrap up in 4 hours or stay the full 8, this update gives you flexibility without sacrificing the thrill of competition.
This red team-style CTF puts you in the role of attackers breaking into an emulated internal network. You'll need a team of 3–4 players ready to hunt for vulnerabilities, decrypt systems, and disable key services.
Bonus: Meet Willa, your new AI teammate offering tips, insights, and live support when you need it.
Let's go—more time, more tools, more chances to win.
Cyber Range
•Jul 17, 2025 • 9am
Still Drowning in Your Data Lake?
Dear CIOs and CTOs, Congratulations! You finally convinced the board to invest millions in your data lake, and after only a decade of work, you've successfully centralized… well… a whole lot of unstructured sludge.
That single source of truth you promised? More like a single point of confusion.
And now — just as you're ready to sit back and bask in the glory of your petabyte-scale swamp — along comes something called agentic frameworks, and suddenly all that centralized data you've been hoarding seems about as useful as a dial-up modem at a 5G conference.
Let's talk about why it's time to reconsider your data strategy.
Blog
•Jul 14, 2025
Hack the Future: AI Meets Security
World Wide Technology's Ina Poecher and Ashley Schrage recap a hands-on WWT event where young women in tech explored real-world AI security challenges, learned about prompt injection and experienced the impact of collaborative STEM education.
Blog
•Jul 11, 2025
Partner POV | The AI Arms Race: When Attackers Leverage Cutting-Edge Tech
AI's dual role in cybersecurity is reshaping the landscape, with criminals leveraging advanced AI models for sophisticated attacks. From AI-enhanced phishing to deepfakes, these tools create highly personalized, convincing threats. As AI evolves, its potential for misuse grows, challenging organizations to stay ahead in this escalating cyber arms race.
Partner Contribution
•Jul 11, 2025
JuicedShop Security Lab Series: Cryptographic Failures
The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•48 launches
Opinion: How to Balance Learning Analytics With Data Privacy
The capacity of learning analytics platforms to collect troves of student data makes them both institutional necessities and liabilities. A handful of best practices can help colleges and universities keep them secure.
News
•Jul 10, 2025
Partner POV | Rapyd Secures APIs to Protect Payment Innovation
In this case study, Akamai demonstrates their ability to revolutionize global payments by securing APIs with unparalleled visibility and automation. They empower the customer to mitigate risks, ensure compliance, and confidently expand into new markets, transforming API security from a black box into a transparent, manageable asset. Discover how this synergy fuels secure, rapid growth.
Partner Contribution
•Jul 8, 2025
Wands at the Ready: Navigating Data Protection and Sovereignty
Welcome to the first installment of our three-part series on Data Sovereignty. In this post, we step into our "Magical Library" to demystify the crucial differences between Data Protection and Data Sovereignty, exploring why understanding these concepts is vital for safeguarding your organization's most sensitive information in an increasingly regulated world.
Blog
•Jul 8, 2025
Zenith Live 2025 Unveils Zscaler Agentic AI: Your Digital Kingdom's New Guardians
Zenith Live 2025 unveiled Zscaler's Agentic AI, transforming cybersecurity into a proactive, intelligent defense. With AI heroes like the Rogue, Paladin, Wizard, Cleric and Bard, this strategy combines autonomous systems with human ingenuity to protect digital realms. Which role do you believe is most vital in this AI-driven defense?
Blog
•Jul 8, 2025