Articles

Cyber Talks

ATT&CK Ransomware: Unraveling the AvosLocker APT 

Date: January 21, 2026 Time: 10:30 AM GMT-3| 8:30 AM EST | 7:00 PM IST Topic: ATT&CK Ransomware: Unraveling the AvosLocker APT Watch Now Abstract: As the threat landscape continues to evolve, ransomware-as-a-service (RaaS) has emerged as a thriving business model for cybercrime, where threat actors develop and lease ransomware to affiliates who execute attacks.…

Read article
AI-Enabled Cybersecurity Best Practices: What Security Leaders Must Adopt

Date: February 24, 2026Time: 9:00 AM EST | 8:00 AM CST | 7:30 PM ISTTopic: AI-Enabled Cybersecurity Best Practices: What Security Leaders Must Adopt Register Now Abstract: As artificial intelligence becomes deeply embedded in enterprise technology stacks, it is reshaping both cyber defense capabilities and the threat landscape itself. Adversaries are increasingly weaponizing AI to…

Read article
Human in the Loop IR: Balancing AI Automation with Control and Compliance 

Date: February 25, 2026 Time: 9:00 AM EST / 8:00 AM CST / 7:30 PM IST Topic: Human-in-the-Loop IR: Balancing AI Automation with Control and Compliance Register Now Abstract: As AI-driven automation becomes central to modern Incident Response (IR), organizations face a critical challenge associated to lack of human oversight and control. Over-automated response can…

Read article
From Risk to Resilience: Women Shaping Modern Cybersecurity Operations 

Date: March 10, 2026 Time: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST Topic: From Risk to Resilience: Women Shaping Modern Cybersecurity Operations Register Now Abstract: Modern cybersecurity operations are evolving from reactive defense models to proactive, risk-driven resilience strategies. With expanding attack surfaces, AI-enabled threats, and increasing regulatory pressure, organizations must…

Read article
From Logs to Evidence: Embedded and IoT Forensics 

Date: December 15, 2025Time: 8:30 AM EST | 7:30 AM CST | 7:00 PM IST Topic: From Logs to Evidence: Embedded and IoT Forensics Watch Now Abstract: With the rapid global adoption of embedded and IoT devices, threat actors are increasingly targeting these technologies to launch sophisticated cyberattacks. The third installment of the “From Logs…

Read article