Security
Security Insights
Filter by Content Types
- No options
1046 results found
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Tools utilized within the game:
🔷Crowdstrike Falcon (EDR tool, end point protection and analysis)
🔷Crowdstrike Logscale (History and logging)
🔷CrowdStrike Cloud Security
🔷CrowdStrike Identity Threat Protection
This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Aug 21, 2025 • 10am
Hands-On Lab Workshop: Juiced Shop, OWASP
Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Juiced Shop Lab. This workshop is designed to introduce fundamental concepts of web application security testing through our CTF mini-games series, JuicedShop. After the live lab, you'll have a better understanding of how to use Burp Suite and will be able to apply those skills to more challenges in our JuicedShop series. This one-hour event is limited to a small group of participants who will have the opportunity to engage in Q&A during the session. Attendees are encouraged to actively participate by launching the lab themselves alongside the presenter for a hands-on experience.
Webinar
•Jul 24, 2025 • 11am
Hands-On Lab Workshop: Cyera Foundations
Join us for the Virtual Lab Workshop! During this exclusive session, the hostwill introduce the Cyera Foundations Lab and Cyera Data Security Platform learning path. This workshop is designed to provide an environment to gain hands-on experience with the fundamental features of Cyera. This one-hour event is limited to a small group of participants who will have the opportunity to engage in Q&A during the session. Attendees are encouraged to actively participate by launching the lab themselves alongside the presenter for a hands-on experience.
Webinar
•Jul 17, 2025 • 11am
🚩Disarm Me CTF: Hack, Decrypt, Disable — Featuring Willa
This is a red team style capture the flag event that puts you and your team in the role of hackers trying to break into an emulated internal network. Assemble a team of 3 to 4 players ready to dig into vulnerabilities, decrypt systems, and disable key services before time runs out.
This time, you'll have Willa on your side. Willa is a new AI teammate built to guide you through the game with real-time tips, helpful insights, and resource suggestions. She can even flag a live proctor if something needs attention. Whether you're stuck on a flag or just need a nudge, Willa has your back.
Get ready to think like an attacker, act fast, and work as a team.
Cyber Range
•Jul 17, 2025 • 9am
JuicedShop Security Lab Series: Cryptographic Failures
The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•45 launches
Zenith Live 2025 Unveils Zscaler Agentic AI: Your Digital Kingdom's New Guardians
Zenith Live 2025 unveiled Zscaler's Agentic AI, transforming cybersecurity into a proactive, intelligent defense. With AI heroes like the Rogue, Paladin, Wizard, Cleric and Bard, this strategy combines autonomous systems with human ingenuity to protect digital realms. Which role do you believe is most vital in this AI-driven defense?
Blog
•Jul 8, 2025
Wands at the Ready: Navigating Data Protection and Sovereignty
Welcome to the first installment of our three-part series on Data Sovereignty. In this post, we step into our "Magical Library" to demystify the crucial differences between Data Protection and Data Sovereignty, exploring why understanding these concepts is vital for safeguarding your organization's most sensitive information in an increasingly regulated world.
Blog
•Jul 8, 2025
Partner POV | Rapyd Secures APIs to Protect Payment Innovation
In this case study, Akamai demonstrates their ability to revolutionize global payments by securing APIs with unparalleled visibility and automation. They empower the customer to mitigate risks, ensure compliance, and confidently expand into new markets, transforming API security from a black box into a transparent, manageable asset. Discover how this synergy fuels secure, rapid growth.
Partner Contribution
•Jul 8, 2025
Identity and Access Management Workshop
As identities span across internal, external, customer or a combination of the three, how are you managing them? What is your confidence level that you know who that identity belongs to? With the trend of "identity is the new perimeter," it is extremely vital that organizations have an IAM strategy and know how IAM can enable a business while strengthening their security posture.
Workshop
•8 hrs
Partner POV | Check Point and Pax8 Partnership Provides Powerful New Security Offerings for MSPs
MSPs face a transformative era as cloud adoption and hybrid work rise. Check Point's partnership with Pax8 empowers MSPs with AI-driven, unified security solutions via the Pax8 Marketplace. This collaboration simplifies operations, enhances protection, and accelerates growth, marking a pivotal shift in delivering enterprise-grade cyber security with increased efficiency and profitability.
Partner Contribution
•Jul 3, 2025
Bridging AI and Cybersecurity: What Check Point MCP Servers Mean for Enterprise Security
Check Point's new MCP Server enables secure, structured integration between AI tools and Check Point's security infrastructure by exposing firewall policies, objects, and logs through a standardized Model Context Protocol interface. This allows large language models like Claude or GPT to query security environments using natural language, dramatically accelerating tasks such as policy analysis, compliance checks, and incident enrichment without requiring scripts or direct API calls. Deployed on-premises for full control and visibility, the MCP Server empowers security teams to automate workflows while maintaining strong governance and auditability.
Blog
•Jul 1, 2025
Partner POV | Zero Trust is Reshaping Cyber Insurance by Reducing Risk
In an era where ransomware attacks continue to show the shortcomings of perimeter-based defenses, Zero Trust has proven itself as a game-changer for cyber insurance outcomes.
Partner Contribution
•Jul 1, 2025