Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ep. 59 - Russia's Cyber Arsenal Exposed: Defeating the FSB, GRU, and BlackCat Before They Strike

In the finale of our Russian intelligence and proxy threat series, SafeBreach engineer Adrian Culley joins host Tova Dvorin to turn five episodes of analysis into concrete, actionable defense. The threat is real—now here's how you stop it.

Arctic Wolf: A Higher Standard

Powering modern security operations with AI is no longer optional. It’s essential. The Aurora Superintelligence Platform is built for the AI era, combining specialized AI agents, real-world security data, and human expertise to deliver outcomes security teams can trust. At its core, the Swarm of Experts, Security Operations Graph, and AI Trust Engine work together to drive faster detection, more accurate investigations, and more decisive response across the attack surface.

Your Browser Is Stealing Your Data Right Now

In this video, you will learn how lightweight OS-level instrumentation binds lineage metadata to clipboard content the moment data is copied, how that tag survives edits, reformatting, and translation across applications, and how provenance-based policy replaces pattern matching with precision rules tied to the actual source of the data. You will also learn how pairing network tools with a browser extension captures user intent before encryption, eliminating the alert fatigue that buries real risk in noise.

VMware to Hyper-V Migration with Microsoft Virtual Machine Converter (Step-by-Step)

In this video, you’ll learn how to migrate a VMware virtual machine to Microsoft Hyper-V using Microsoft Virtual Machine Converter (MVMC). The walkthrough covers two real-world migration scenarios: Migrating a VMware VM from an ESXi host using the MVMC GUI Converting VMware virtual disks to Hyper-V format using PowerShell cmdlets The example VM runs Windows Server 2019, and the video explains key prerequisites such as uninstalling VMware Tools, checking the boot mode (BIOS or UEFI), and choosing the correct Hyper-V VM generation.

An inside look at finding Leaked CISA AWS GovCloud Admin Keys on Github

In this interview, GitGuardian security researcher Guillaume Valadon breaks down how GitGuardian discovered a public GitHub repository exposing CISA-related secrets, including plain-text passwords, AWS tokens, SAML certificates, CI/CD files, Kubernetes manifests, and internal operational documentation. We discuss how the leak was identified, why exposed secrets can create immediate risk, and how GitGuardian helped escalate the disclosure until the repository was taken offline within 26 hours.

Govern AI agents the right way with Identity Manager by One Identity

AI agents are becoming an inseparable part of identity governance, sometimes being created by other AI agents and acting proactively across platforms at machine speed — but who’s watching them? Identity Manager 10.0 by One Identity answers that question. Hear Ingrid Thorpe, director of product management for Identity Manager, explore how the solution governs agentic workflows, tackles agent-specific risks and integrates across cloud and enterprise platforms, holding non-human identities (NHIs) accountable.

Partnerships, AI, and Emerging Threats with Peter Johnson - The 443 Podcast - Episode 371

Recorded at WatchGuard’s EMEA Partner Conference, in Dubrovnik, Croatia, this episode of 443 – Security Simplified features Peter Johnson from Schwartz GmbH for a conversation on how cybersecurity priorities are evolving across Europe. Peter discusses the increasing complexity organizations face when balancing security, compliance, and operational efficiency, along with the challenges of supporting customers and partners with varying levels of cybersecurity maturity.