Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP 8 - Zero Trust, Zero Chill: Securing Machine Identity

In this episode of Security Matters, host David Puner welcomes Kevin Bocek, CyberArk SVP of Innovation, for an insightful discussion on the critical role of machine identity in modern cybersecurity. As digital environments become increasingly complex, securing machine identities has never been more crucial.

Layer 7 DDoS Attack Methods

A10 Networks' security experts Jamison Utter and Carlo Alpuerto delve into comprehensive DDoS protection. In this segment, Carlo Alpuerto explains how attackers exploit Layer 7 DDoS methods, such as slow POST attacks and other slow-rate techniques (potentially referring to "slow patches" or similar application-layer attacks), to disrupt services. Whether you're a security professional, network administrator, or business leader concerned about cyber resilience, this expert conversation provides actionable insights to strengthen your organization's DDoS protection posture.

Our AI is scanning the dark web to recover stolen credentials right now. #cybersecurity #ai #vendor

Our AI is scanning the dark web right now — here’s what it’s finding. In this cybersecurity short, we give you a real-time glimpse into how AI-driven tools are monitoring the dark web for stolen credentials, emerging threats, and malicious activity before it reaches your business. From detecting leaked passwords to identifying early signs of cyberattacks, AI is transforming threat intelligence and external attack surface management (EASM).

The Cloud Crew and Digital Shield and Graylog

Watch how Digital Shield is Transforming Cybersecurity in South Africa In this interview, Tim Smith — Sales Director at Digital Shield, a cybersecurity-focused subsidiary of The Cloud Crew — shares insights into the evolving threat environment and how businesses in South Africa are responding with more innovative, more strategic security solutions.

Broken Access Control Vulnerability

In this video, we delve into the critical aspect of Vulnerability Access Control and its significance in safeguarding digital assets. Access control mechanisms are fundamental in preventing unauthorized access and ensuring that only authorized users can interact with sensitive data and systems. Why It Matters?: Access control vulnerabilities are among the most prevalent security issues in web applications, often leading to data breaches and unauthorized access. Understanding and implementing robust access control measures is essential for any cybersecurity strategy.

May 27, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: Joint Cybersecurity Advisory released on KTA007 (APT28) A joint advisory has been released warning of Russian-attributed threat actors targeting western logistics entities and technology companies since 2022. Microsoft leads global action to disrupt LUMMASTEALER Microsoft’s Digital Crimes Unit has recently seized and facilitated the takedown, suspension, and blocking of approximately 2,300 malicious domains that formed the backbone of LUMMASTEALER infrastructure.

The MemcycoFM Show: Episode 3 - Memcyco Recognized in Datos Insights' 2025 Fintech Spotlight Report

The battle for digital trust is intensifying. Fraudsters are no longer lone actors, they’re industrialized operations, using AI-driven phishing kits and Phishing-as-a-Service models to exploit businesses and their customers at unprecedented speed. In this environment, traditional fraud defenses are collapsing under the weight of innovation they weren’t designed to face.

The MemcycoFM Show: Episode 2 - How to Choose the Best Domain Takedown Service

If you’re searching for the best domain takedown service, chances are your brand has already been impersonated, or you’re proactively trying to stop that from happening. Either way, you know the stakes: malicious sites that mimic your brand can destroy trust, harvest credentials, and cost your business real revenue. Of course, ‘best’ depends on your threat landscape and internal priorities. This episode breaks down what actually matters so you can choose the right fit for your needs.