Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Zero Trust That Actually Works: How Reach Maps NIST & CISA Frameworks Into Real Security Gains

Most organizations don’t lack intent; they lack a clear understanding of what’s deployed today, what gaps matter most, and how to turn guidance into enforceable baselines. Reach connects to your existing security tools and automatically maps configurations to established maturity models like CISA’s Zero Trust Maturity Model 2.0 — producing a real-time posture assessment across identity, device, endpoint, email, and network with no surveys or guesswork.

Intel Chat: AI takes over entry work, AI cyber espionage, JackFix & weaponizing Blender files [272]

Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Can Claude Opus 4.5 Build a SECURE Note Taking App?

Can Claude Opus 4.5 actually build a secure, fully functional note-taking app? In this video, I challenge the latest Claude model to create an app with real features — create, edit, update, delete, plus basic security — and see if the code holds up in practice. This is a real test of how far AI can go in building usable software.

Master Your Application Security Risk with Veracode's Application Risk Management Platform

Discover how Veracode's Application Risk Management Platform transforms application security from a growing liability into a strategic advantage. Watch this video to learn how Veracode cut's through the chaos of expanding portfolios, AI-driven development, and vulnerable supply chains to deliver clarity, prioritization, and automated remediation.

What CVE-2025-32433 Is and Why It Matters ?

A new critical vulnerability—CVE-2025-32433, also known as the Erlang SSH Chainbreaker—allows attackers to execute commands without authentication. This video breaks down what the flaw is, how the exploit works, why it’s dangerous, and which systems are at risk. In Part 1, you’ll learn: Severity: CVSS 10.0 — Exploited in the wild Risk: Full host compromise, data theft, operational disruption.