Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

HuntIQ - Tanium Tech Talks #149

Expert-led threat hunting… ️ Imagine getting golf lessons from Tiger Woods, hacking lessons from Kevin Mitnick, or gaming lessons from Valkyrae. Ok. They are the GOATs. Really good. But what about? If only someone could ride along with me, enhance my skills, and teach me how to fish (not phish). That's kinda what Tanium HuntIQ is about. Imagine threat hunting with a pro, as they teach you how to use and customize tools for your environment. Oh, and results. They help you deliver at a new level. And they do this with you for a year. That's career gold.

Endpoint Management for Operational Technology - Tanium Tech Talks #148

Tanium Endpoint Management for Operational Technology… "OT" Today see how Tanium now offers visibility for OT and ICS devices in manufacturing and industrial environments. Tanium full stack visibility at speed and scale on the OT shop floor Using native device protocols from a Tanium client satellite Query & report on devices & vulnerabilities using a familiar Tanium experience IT & OT global visibility converged into a single solution.

2025 Security Predictions Recap - The 443 Podcast - Episode 349

This week on the podcast, we review our 2025 security predictions and grade ourselves on our accuracy. We recap all 6 predictions for 2025 from multi-modal AI being used to create entire attack chains to the CISO role becoming the least desirable role in business, and follow up on this year's news to see if they hit or not.

Agentic AI and Identity Sprawl: The Convergence Redefining Cyber Risk

Welcome to Data Security Decoded. In this episode, Caleb Tolin welcomes back Joe Hladik, Head of Rubrik Zero Labs, for a focused look at how identity-driven threats are redefining modern security. Drawing insights from Rubrik Zero Labs’ latest report, Identity Crisis: Understanding and Building Resilience Against Identity-Driven Threats, Joe explains why identity has become the new perimeter in an era where hybrid and multi-cloud environments dominate.

The Shadow AI Disconnect CISOs Need to Know

Our new State of Shadow AI Report has just uncovered a critical disconnect that all security leaders need to be aware of. We all know shadow AI is exploding, and that blocking is the most logical response. How else are you going to regain control? But our data shows this is backfiring: This is where blocking can get dangerous. It doesn't stop AI; it just limits your visibility. Download the full (ungated) shadow AI report to see all the data.

Admin MCP

Apono announces the launch of our Admin MCP (Model Context Protocol), a new tool that simplifies organizational access management through natural language queries. The product works with MCP-supported clients like Claude and Cursor, allowing administrators to quickly answer access questions without manually navigating through dashboards and permissions. This demo shows how users can instantly check if someone can access database resources or get comprehensive audit reports for AWS production accounts.

Attackers are integrating LLMs directly into malware #cybersecurity #ai #malware #infosec #podcast

Threat actors have moved beyond using AI to speed up operations. They're now embedding large language models directly into malware. In this Intel Chat, Matt Bromiley and Chris Luft discuss Google's Threat Intelligence Group findings on malware families like PromptFlux and PromptSteal. These threats query LLMs mid-execution to dynamically alter behavior, obfuscate code, and generate system commands on demand.

Why 95% AI Fails #shorts #ai

AI On The Edge – Where Intelligence Meets Risk: Part 3 Building an enterprise AI app is NOT the same as building a traditional application, and this is why so many AI projects fail. In this conversation, we break down why 95% of enterprise AI implementations fail, what teams misunderstand about AI systems, and how to actually build AI that works in real organizations.