|
About the Defender Fridays category
|
|
0
|
21
|
March 11, 2025
|
|
[Defender Fridays] Vulnerability remediation, bug bounties, and incident response with Bryan Brake - December 12
|
|
1
|
6
|
December 12, 2025
|
|
[Defender Fridays] AI and malware with Randy Pargman - December 5
|
|
1
|
8
|
December 5, 2025
|
|
[Defender Fridays] No session for the next 2 weeks, see you on December 5th!
|
|
0
|
4
|
November 20, 2025
|
|
[Defender Fridays] Zero trust with Chase Cunningham - November 14
|
|
0
|
6
|
November 13, 2025
|
|
[Defender Fridays] Career paths in cyber defense and AI in the SOC with Alec Fenton - November 7
|
|
0
|
12
|
November 5, 2025
|
|
[Defender Fridays] Modern SecOps: What and AI-ready SOC actually means with Anton Chuvakin - October 24
|
|
1
|
22
|
October 29, 2025
|
|
[Defender Fridays] Decrypting Microsoft Defender for endpoint licensing with Ken Westin - October 17
|
|
0
|
20
|
October 16, 2025
|
|
[Defender Fridays] Using honeyfiles to detect adversaries and infostealers with Zane Gittins - October 10
|
|
1
|
35
|
October 10, 2025
|
|
[Defender Fridays] Identity automation in the age of agentic AI with Matthew Chiodi - October 3
|
|
1
|
16
|
October 10, 2025
|
|
[Defender Fridays] Typhoon Season: Hunting chinese state actors with the latest CISA joint advisory with David Burkett - September 19
|
|
1
|
31
|
September 26, 2025
|
|
[Defender Fridays] Building the Strelka file scanning system with Josh Liburdi - September 26
|
|
0
|
20
|
September 25, 2025
|
|
[Defender Fridays] How AI is changing your SOC workflows with Matt Bromiley - September 5
|
|
1
|
30
|
September 15, 2025
|
|
[Defender Fridays] Security Potpourri with Cliff Janzen - September 12
|
|
1
|
22
|
September 15, 2025
|
|
No Defender Fridays this week (8/29). See you next week!
|
|
0
|
15
|
August 27, 2025
|
|
Remote management tool abuse with Ezra Woods - August 15th, 2025
|
|
1
|
23
|
August 22, 2025
|
|
Detection prioritization via the BloodHound attack graph with Jared Atkinson - August 22, 2025
|
|
0
|
29
|
August 22, 2025
|
|
EDR, DFIR and Endpoint Triage with Brian Carrier - June 20th, 2025
|
|
0
|
52
|
June 20, 2025
|
|
Maintaining human touch in security operations with Hayden Covington - June 13th, 2025
|
|
0
|
29
|
June 11, 2025
|
|
Defending AI on the Edge with David Weston - June 6th, 2025
|
|
0
|
31
|
June 5, 2025
|
|
Cloud detections in an age of cloud tools with Fred Wilmot - May 23rd, 2025
|
|
0
|
25
|
May 21, 2025
|
|
The importance of a trusted ecosystem in incident response with Mike Saylor - August 8th, 2025
|
|
1
|
18
|
August 14, 2025
|
|
The challenges of securing AI adoption with Jeremy Snyder - August 1st, 2025
|
|
1
|
35
|
August 1, 2025
|
|
Autonomous SOC, AI for cybersecurity and security automation with Filip Stojkovski - July 24th, 2025
|
|
1
|
46
|
July 31, 2025
|
|
AI scraping and internal threats with Lera Leonteva - July 18th, 2025
|
|
1
|
45
|
July 18, 2025
|
|
Close access denial: Cyberphysical protection for high value assets with Lennart Koopmann - July 11th, 2025
|
|
1
|
32
|
July 18, 2025
|
|
Building the cloud security program at Github with Shaun McCullough - May 30th, 2025
|
|
1
|
45
|
May 30, 2025
|
|
Modernizing workspace detection and response with Rajan Kapoor - May 16th, 2025
|
|
1
|
43
|
May 16, 2025
|
|
Assessing risk with MITRE ATT&CK with Frank Duff - May 9th, 2025
|
|
0
|
29
|
May 8, 2025
|
|
RSAC debrief with the LimaCharlie team - May 2nd, 2025
|
|
1
|
31
|
May 2, 2025
|