Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ep 7: SOAR Loser: Does the O in SOAR stand for obsolete?

SOAR might sound like a superhero for security teams, but is it actually flying too close to the sun? In this episode, Adam and David unpack why security orchestration, automation, and response have been helpful… but might be headed for retirement, thanks to AI shaking up the game. They also dig into the headaches of managing clunky SOAR systems and why it’s time to rethink workflows and case management before you get left in the dust.

Five-Year Plans, Forever Wars: China's Blueprint for Cyber Dominance

Chinese state-backed cyber operations are often misunderstood as a single, centrally controlled machine. In reality, they are fragmented, diverse, and strategically aligned with China’s national objectives, from economic development to critical infrastructure positioning. In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Mei Danowski, Co-Founder of Natto Thoughts and expert in geopolitical intelligence, to explore how China’s cyber ecosystem operates and how it is shaped by cultural, political, and economic structures.

Black Hat 2025 - From Chaos to Control - How Bank Of Hope Achieved Zero Critical Vulnerabilities

At Black Hat 2025, Nucleus Security and Bank of Hope shared how a small but determined security team transformed its vulnerability management program into a risk-driven, automated operation.

Intel Chat: Apache ActiveMQ, Elastic EDR vulnerability, kernel-level EDR killers & PipeMagic [241]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.