Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ep 40: What to expect when you are expecting an audit

On this episode of Masters of Data, we brought back GRC expert Cassandra Mooseburger to pull back the curtain on audits, and spoiler: it is far less scary than the IRS knocking on your door. We break down what actually separates a certification from an attestation from a report, how to run a prep process that does not send your engineering team running for the hills, and why the social capital you build across the business is just as important as the evidence you collect. If you have ever wondered how compliance work translates into closed deals and customer trust, this one connects those dots.

Bugs & Betrayal - Vect Analysis

Vect is a newly observed RaaS operation that emerged in December of 2025, with affiliate recruitment and victim postings following shortly after in January 2026. Following the 19th of March 2026 Trivy/LiteLLM supply chain attack conducted by TeamPCP, in which ~340 GB uncompressed data was stolen, Vect announced on the dark web forum “Breached” that they would be partnering with TeamPCP.

Observability is security (We just pretended it wasn't)

For years, we’ve drawn this artificial line that equates observability with uptime, performance, and SRE dashboards, while security is about threats, alerts, SIEMs, and “bad things.” While that separation was always convenient, it was never real. The same logs that tell you your service is slow are the same ones that tell you it’s compromised. We just routed them to different teams, different tools, and different budgets, then acted surprised when neither side had the full picture.

How CDW + Tanium Are Securing Hospitals and Cutting IT Costs by 30-50%

Healthcare IT is at an inflection point — rising costs, thousands of unmanaged devices, and ever-growing cyber threats are putting pressure on hospitals to act. In this video, CDW's healthcare team explores how their partnership with Tanium is helping health systems take control. Learn how the CDW + Tanium solution can help hospitals manage 20,000+ devices across a facility, protect against cyberattacks, reduce IT costs by 30–50%, and free up nurses and clinicians to focus on what matters most: patient care.

The Adversary's Speed Just Changed - What Mythos Means for Your Security Posture

The cybersecurity threat landscape just changed — and most organizations don't know it yet. In this conversation, Tanium's Pedro (CRO) and Mark Liu (VP of Solution Engineering) break down what Anthropic's Mythos really is, why security leaders everywhere are asking about it, and what organizations need to do right now. No marketing pitch — just a straight conversation about a consequential shift that's already underway.

Bot Management vs. ThreatX: How to Stop Business Logic Fraud

Bot Management vs. ThreatX: How to Stop Business Logic Fraud In this video, A10 Networks security expert Gary Wang explores the critical differences between dedicated bot management platforms and the ThreatX approach. If you are concerned about protecting your web applications from sophisticated fraud, this breakdown is essential viewing. Using a real-world scenario—a convenience store referral program being exploited by bad actors—Gary explains how attackers bypass standard defenses to commit "business logic" fraud.

Let's Talk Security: Operationalizing Zero Trust

In this conversation, Forescout CEO Barry Mainz sits down with Dr. Chase Cunningham, also known as “Dr. Zero Trust,” to unpack why Zero Trust is often harder to implement than expected in real-world environments. They also explore what changes when Zero Trust becomes universal (UZTNA)—extending across every connection, every asset, and every environment.

AI SecOps Worskhop Series: Detection Engineering with LimaCharlie and Claude Code

This hands-on workshop is designed for security professionals interested in learning how to integrate advanced AI capabilities into their detection and response workflows. Attendees will receive practical, step-by-step instruction on leveraging the power of Claude Code, a sophisticated AI agent, to significantly enhance security operations within the LimaCharlie platform for detection engineering use cases.