Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Cybersecurity is Dead | The Cyber Resilience Playbook

“The cybersecurity industry as we knew it is dead." Rubrik CEO Bipul Sinha explains why the security industry’s obsession with "walls and detection" has failed. AI-powered attacks have reduced the window between intrusion and breach to zero seconds. The only path forward is a fundamental shift from reactive defense to preemptive recovery, at machine speed.

The Terrorist Designation: A New Red Line for Ransomware with Cynthia Kaiser

In this episode, host ⁠Caleb Tolin⁠ explores the battlefield of enterprise defense, which has moved from simple data theft to ultra heinous crimes that put patient outcomes at risk. Guest ⁠Cynthia Kaiser⁠ shares Battlefield Stories from her time at the FBI and her current work as SVP of the Ransomware Research Center at ⁠Halcyon⁠ (@halcyonsecurity ) illustrating how the industrialization of cybercrime has reached a tipping point. They dive into the alarming reality of modern dwell times, specifically looking at how groups like Akira move from initial access to full encryption in as little as one hour.

Your Backups Know More Than You Think

You may not be aware of how valuable your backups are: they can contain extremely valuable information that leaves a record of what your other security tools may have missed. This is just one of the many interesting tidbits Kyle Fiehler provided on his recent episode of Data Security Decoded. Kyle also explains how threat actors exploit backup blind spots, why identity and recovery are now prime attack surfaces, and how security leaders can rethink MTTR.

OUT OF BAND | The Breaking Point: Inside Mythos' Zero-Day Machine with Anthropic's Nicholas Carlini

Nicole Perlroth sits down with Nicholas Carlini for an Out of Band conversation on the imminent zero-day surge. Carlini explains what Mythos can already do: find and exploit flaws in some of the world’s most hardened, widely deployed software—with minimal human input. He details what Mythos has already hacked, which now includes most of the operating systems in use.

The Silent Data Problem in Hospitals

We’ve all been there: a temporary file created for a claim gets saved and forgotten. Ten years later, that "temporary" file is a massive liability. Stephen Bader from Powers Health shares how they are tackling sensitive data sprawl. It’s not malicious; it’s just how work happens. But identifying and securing that PHI is a multi-year project every healthcare system needs to start today. Hear how Powers Health is cleaning up their data footprint with Josh Howell.

The Three-Layer Strategy for Autonomous Agent Governance with Joe Hladik and Amit Malik

The race for AI dominance has created a dangerous imbalance between business velocity and cyber resilience. In this episode, host Caleb Tolin is joined by ⁠Joe Hladik⁠, Head of ⁠Rubrik⁠ Zero Labs, and Staff Security Researcher ⁠Amit Malik⁠ to break down the findings of their latest report on agentic adoption. The discussion centers on the Agentic Paradox. This is the technical reality that tools designed to automate high-level tasks are inherently built to find the most efficient path around obstacles, including existing security policies.