Skip to content
Monday, December 22, 2025
The TechBriefs
  • Home
  • Technology
  • AI
  • Computers
  • Security
  • Internet
  • Press Releases
    • GlobeNewswire
    • PRNewswire
  • Contact

Category: Webinar

  • Home
  • Webinar
Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes
  • Security
  • Webinar

Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes

  • 0

Dec 10, 2025The Hacker NewsCloud Security / Threat Detection Cloud security is changing. Attackers are no longer just breaking down […]

Webinar: The “Agentic” Trojan Horse: Why the New AI Browsers War is a Nightmare for Security Teams
  • Security
  • Webinar

Webinar: The “Agentic” Trojan Horse: Why the New AI Browsers War is a Nightmare for Security Teams

  • 0

The AI browser wars are coming to a desktop near you, and you need to start worrying about their security […]

Webinar: Learn to Spot Risks and Patch Safely with Community-Maintained Tools
  • Security
  • Webinar

Webinar: Learn to Spot Risks and Patch Safely with Community-Maintained Tools

  • 0

Nov 26, 2025The Hacker NewsSoftware Security / Patch Management If you’re using community tools like Chocolatey or Winget to keep […]

[Webinar] Shadow AI Agents Multiply Fast —  Learn How to Detect and Control Them
  • Security
  • Webinar

[Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them

  • 0

Sep 09, 2025The Hacker NewsArtificial Intelligence / Threat Detection ⚠️ One click is all it takes. An engineer spins up […]

Webinar: Why Top Teams Are Prioritizing Code-to-Cloud Mapping in Our 2025 AppSec
  • Security
  • Webinar

Webinar: Why Top Teams Are Prioritizing Code-to-Cloud Mapping in Our 2025 AppSec

  • 0

Aug 28, 2025The Hacker NewsCloud Security / Generative AI Picture this: Your team rolls out some new code, thinking everything’s […]

Webinar: What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive
  • Security
  • Webinar

Webinar: What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive

  • 0

Aug 13, 2025The Hacker NewsArtificial Intelligence / Identity Security The AI revolution isn’t coming. It’s already here. From copilots that […]

Webinar: How to Stop Python Supply Chain Attacks—and the Expert Tools You Need
  • Security
  • Webinar

Webinar: How to Stop Python Supply Chain Attacks—and the Expert Tools You Need

  • 0

Aug 07, 2025The Hacker NewsDevSecOps / Supply Chain Security Python is everywhere in modern software. From machine learning models to […]

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program
  • Security
  • Webinar

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

  • 0

May 22, 2025The Hacker NewsSecurity Framework / Cyber Defense It’s not enough to be secure. In today’s legal climate, you […]

[Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Security
  • Webinar

[Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications

  • 0

May 16, 2025The Hacker NewsDevSecOps / Threat Detection Modern apps move fast—faster than most security teams can keep up. As […]

[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats
  • Security
  • Uncategorized
  • Webinar

[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats

  • 0

Apr 30, 2025The Hacker News How Many Gaps Are Hiding in Your Identity System? It’s not just about logins anymore. […]

Posts pagination

1 2 Next
  • Privacy Policy
  • Terms of use
Theme: Terminal News By Adore Themes.