Media Summary: Presentation video for our paper “Jailbreaking Embodied LLMs via Action-Level Manipulation” in ACM/IEEE SENSYS 2026. SOC Interview Q&A: Scenario Based SOC Interview Q&A Part 2: AI is transforming the cybersecurity threat landscape, enabling more sophisticated phishing, ransomware, and ...

Suzanne Lemieux Api Quick Brief Confronting Escalating Cyber Attacks - Detailed Analysis & Overview

Presentation video for our paper “Jailbreaking Embodied LLMs via Action-Level Manipulation” in ACM/IEEE SENSYS 2026. SOC Interview Q&A: Scenario Based SOC Interview Q&A Part 2: AI is transforming the cybersecurity threat landscape, enabling more sophisticated phishing, ransomware, and ... In this new series, Mike Elissen, Sr. Developer Advocate at Akamai Technologies and expert in cybersecurity implementations, ... Welcome to Blue Team Resources! In this video, we'll dive into the Phishing Incident Response Playbook, providing a ... Attackers are no longer just getting creative—they're getting efficient. They're now combining

Ready to become a certified watsonx AI Assistant Engineer? Register now and use code IBMTechYT20 for 20% off of your exam ... What actually happens inside a SOC team during a Become a senior software engineer with a job guarantee: Credential theft is the cause of enterprise data breaches today. While traditional SSO (Okta, Entra, Ping) is a great start, ...

Photo Gallery

Suzanne Lemieux, API - Quick Brief: Confronting Escalating Cyber Attacks
Interview: Suzanne Lemieux, API - Confronting Escalating Cyber Attacks
Ryan Boulais, AES - Quick Brief: Confronting Escalating Cyber Attacks
SenSys 2026 Talk: Jailbreaking Embodied LLMs via Action-Level Manipulation
Scenario Based SOC Analyst Interview Questions and Answers | Part 1 | Security Analysts | SOC| Cyber
Fight Back Against AI Cyberattacks | Agentic AI Summit | April 2026
Understanding The Fundamentals of API Security | How APIs are Attacked and How to Secure Them
Phishing Incident Response Playbook: Step-by-Step Guide for SOC Analysts 🎣🛡️
API Security Explained: Rate Limiting, CORS, SQL Injection & More
API Attacks Surge 113%: Why Attackers Are Now Targeting System Interfaces | Steve Winterfeld
How Hackers Exploit APIs
AI Agents for Cybersecurity: Enhancing Automation & Threat Detection
View Detailed Profile
Suzanne Lemieux, API - Quick Brief: Confronting Escalating Cyber Attacks

Suzanne Lemieux, API - Quick Brief: Confronting Escalating Cyber Attacks

Quick brief

Interview: Suzanne Lemieux, API - Confronting Escalating Cyber Attacks

Interview: Suzanne Lemieux, API - Confronting Escalating Cyber Attacks

Suzanne Lemieux

Ryan Boulais, AES - Quick Brief: Confronting Escalating Cyber Attacks

Ryan Boulais, AES - Quick Brief: Confronting Escalating Cyber Attacks

Quick brief

SenSys 2026 Talk: Jailbreaking Embodied LLMs via Action-Level Manipulation

SenSys 2026 Talk: Jailbreaking Embodied LLMs via Action-Level Manipulation

Presentation video for our paper “Jailbreaking Embodied LLMs via Action-Level Manipulation” in ACM/IEEE SENSYS 2026.

Scenario Based SOC Analyst Interview Questions and Answers | Part 1 | Security Analysts | SOC| Cyber

Scenario Based SOC Analyst Interview Questions and Answers | Part 1 | Security Analysts | SOC| Cyber

SOC Interview Q&A: https://youtu.be/exZgiXH282U Scenario Based SOC Interview Q&A Part 2: https://youtu.be/WkXdumD_mjM ...

Fight Back Against AI Cyberattacks | Agentic AI Summit | April 2026

Fight Back Against AI Cyberattacks | Agentic AI Summit | April 2026

AI is transforming the cybersecurity threat landscape, enabling more sophisticated phishing, ransomware, and ...

Understanding The Fundamentals of API Security | How APIs are Attacked and How to Secure Them

Understanding The Fundamentals of API Security | How APIs are Attacked and How to Secure Them

In this new series, Mike Elissen, Sr. Developer Advocate at Akamai Technologies and expert in cybersecurity implementations, ...

Phishing Incident Response Playbook: Step-by-Step Guide for SOC Analysts 🎣🛡️

Phishing Incident Response Playbook: Step-by-Step Guide for SOC Analysts 🎣🛡️

Welcome to Blue Team Resources! In this video, we'll dive into the Phishing Incident Response Playbook, providing a ...

API Security Explained: Rate Limiting, CORS, SQL Injection & More

API Security Explained: Rate Limiting, CORS, SQL Injection & More

How hackers break into your

API Attacks Surge 113%: Why Attackers Are Now Targeting System Interfaces | Steve Winterfeld

API Attacks Surge 113%: Why Attackers Are Now Targeting System Interfaces | Steve Winterfeld

Attackers are no longer just getting creative—they're getting efficient. They're now combining

How Hackers Exploit APIs

How Hackers Exploit APIs

GraphQL

AI Agents for Cybersecurity: Enhancing Automation & Threat Detection

AI Agents for Cybersecurity: Enhancing Automation & Threat Detection

Ready to become a certified watsonx AI Assistant Engineer? Register now and use code IBMTechYT20 for 20% off of your exam ...

Who Responds During a Cyber Attack?

Who Responds During a Cyber Attack?

What actually happens inside a SOC team during a

API Security Explained: Rate Limiting, CORS, SQL Injection, CSRF, XSS & More

API Security Explained: Rate Limiting, CORS, SQL Injection, CSRF, XSS & More

Become a senior software engineer with a job guarantee: https://go.hayksimonyan.com/133-

Eliminate Credential Theft: 100% SaaS Visibility & Control [Webinar]

Eliminate Credential Theft: 100% SaaS Visibility & Control [Webinar]

Credential theft is the #1 cause of enterprise data breaches today. While traditional SSO (Okta, Entra, Ping) is a great start, ...