Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

#198 - AI risk and safety with John Vaina, AI Researcher & Red Teamer

On this episode of The Cybersecurity Defenders Podcast we talk with John Vaina, AI Researcher and Red Teamer, about AI risk and safety. John is an expert in AI risk, safety, and security. John currently works as an AI red team operator, tackling some of the most complex challenges in the field. His work spans traditional cybersecurity concerns, such as identifying vulnerabilities in AI systems, to cutting-edge tasks like testing for emergent behaviors and conducting AI alignment and safety audits.

Identity Threat Detection and Response: Practical Strategies for Protection

The Key to Protecting Your Directory Separating privileges is one of the most effective ways to stop cyberattacks from spreading. Proper security controls are needed at every level, from domain admins to workstation admins. But overcomplicated setups can actually do more harm than good. Learn how to build a practical, effective tiering model to secure your organization, without unnecessary complexity.

DANGER: Phishing messages

DANGER: Phishing messages are easier than ever for someone to make and send, thanks to the likes of GenAI. That’s what Mostafa Hassanin, Group CISO at SMG, told our host Mark Dembo on this episode of The Connectivity Cloud Podcast. The pair, along with Cloudflare’s VP of Emerging Tech and Incubation, Sam Rhea, discussed the challenges of weaponized AI threats, alongside other real-life impacts of AI on enterprise security and operations.

The Harsh Reality of Ransomware Attacks: It's Not a 4-Hour Fix

Even well-prepared organizations with strong security are surprised by the intensity and length of cyber attacks. Heather Hughes notes that many expect quick solutions but are unprepared for the reality. "This process isn't over in two days," she explains, countering the myth of a 'big red button' fix. For more on how organizations should prepare, hear Heather, VP at Aon Cyber Solutions in the latest episode of podcast.

Understanding the IAM Blast Radius

In this episode of Into the Breach, James Purvis and Mike Schmidt delve into the concept of the IAM (Identity and Access Management) blast radius and its impact on modern security practices. They explore how DSPM (Data Security Posture Management) helps reduce noise, focus on sensitive data, and implement proactive least-privilege models to mitigate risks in cloud and SaaS environments. Learn how understanding the interplay between identities and data can enhance security outcomes and minimize the blast radius of breaches.

Random but Memorable - Episode 14.4: Security Audit App Ideas with Jacob DePriest

What’s it like to work as a CISO at a security company? This week, 1Password’s VP of Security and CISO, Jacob DePriest, reveals all. Jacob also shares his advice for building strong security teams with diverse perspectives, backgrounds, and skillsets. In Watchtower Weekly, we unpack a novel technique to break into businesses - pretending to offer audits of the company's cybersecurity. Plus, Matt & Roo share their best app ideas in Alternative Security Questions.