Articles

Recent Cybertalks

From Risk to Resilience: Women Shaping Modern Cybersecurity Operations 

Date: March 10, 2026 Time: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST Topic: From Risk to Resilience: Women Shaping Modern Cybersecurity Operations Watch Now Abstract: Modern cybersecurity operations are evolving from reactive defense models to proactive, risk-driven resilience strategies. With expanding attack surfaces, AI-enabled threats, and increasing regulatory pressure, organizations must…

Read article
Human in the Loop IR: Balancing AI Automation with Control and Compliance 

Date: February 25, 2026Time: 9:00 AM EST / 8:00 AM CST / 7:30 PM ISTTopic: Human-in-the-Loop IR: Balancing AI Automation with Control and Compliance Watch Now Abstract: As AI-driven automation becomes central to modern Incident Response (IR), organizations face a critical challenge associated to lack of human oversight and control. Over-automated response can introduce compliance…

Read article
AI-Enabled Cybersecurity Best Practices: What Security Leaders Must Adopt

Date: February 24, 2026 Time: 9:00 AM EST | 8:00 AM CST | 7:30 PM IST Topic: AI-Enabled Cybersecurity Best Practices: What Security Leaders Must Adopt Watch Now Abstract: As artificial intelligence becomes deeply embedded in enterprise technology stacks, it is reshaping both cyber defense capabilities and the threat landscape itself. Adversaries are increasingly weaponizing…

Read article
Modern Red Teaming & EDR Evasion Techniques

Date: February 13, 2026 Time: 1:30 PM WET | 8:30 AM EST | 7:00 PM IST Topic: Modern Red Teaming & EDR Evasion Techniques Watch Now Abstract: The objective of this session is to explore HTML Smuggling—an often overlooked but highly effective technique used by attackers to bypass modern security controls. While the concept has…

Read article
ATT&CK Ransomware: Unraveling the AvosLocker APT 

Date: January 21, 2026 Time: 10:30 AM GMT-3| 8:30 AM EST | 7:00 PM IST Topic: ATT&CK Ransomware: Unraveling the AvosLocker APT Watch Now Abstract: As the threat landscape continues to evolve, ransomware-as-a-service (RaaS) has emerged as a thriving business model for cybercrime, where threat actors develop and lease ransomware to affiliates who execute attacks.…

Read article
From Logs to Evidence: Embedded and IoT Forensics 

Date: December 15, 2025Time: 8:30 AM EST | 7:30 AM CST | 7:00 PM IST Topic: From Logs to Evidence: Embedded and IoT Forensics Watch Now Abstract: With the rapid global adoption of embedded and IoT devices, threat actors are increasingly targeting these technologies to launch sophisticated cyberattacks. The third installment of the “From Logs…

Read article