Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Speaking Different Languages: How to Align Dev and Sec Teams Effectively

Security issues in software development often stem not from developers’ lack of concern but from a fundamental disconnect between development and security teams. Each wants to do their job well, but their goals and expectations frequently conflict. This misalignment costs organizations in heightened security risks and tangible operational setbacks. Security issues identified too late in the cycle delay releases and increase project costs.

The Psychological Toll of Cybersecurity: You Can't Unsee It

Out on 17th September! Some trauma doesn’t come from what happens to you — but from what you witness online. In this powerful episode preview, Eve Parmiter shares raw insight into the mental health challenges facing cybersecurity professionals exposed to extreme, distressing or graphic material in their work. From secondary trauma to organisational neglect, we explore why the industry needs better language, better support, and far less stigma.#CyberSecurity.

Intel Chat: JavaScript phishing, undersea cables cut, Contagious Interview campaign & Salty2FA [247]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

LCQL Made Simple with AI #cybersecurity #ai

LimaCharlie Query Language (LCQL) enables security teams to search across their entire multi-platform fleet, from Windows Event Logs to Linux package installations to macOS volume mounts. Our MCP server allows users to generate LCQL queries from plain-text language commands. Eric Capuano, founder of Digital Defense Institute, demoed this during our webinar: "I want an LCQL query that'll go and find processes in the last twenty four hours that exhibit signs of x. I can just give it that instruction... that MCP tool will work it out and give Claude the ideal LCQL query to run.".

How AI is (or should be) changing SOC workflows with Matt Bromiley

We dove into AI in the SOC with Matt Bromiley from Prophet Security! Matt broke down how AI is transforming (and should be transforming) SOC workflows. Whether you're already using AI tools or wondering where to start, this is the conversation you don't want to miss.

Don't SOC-block your best engineer

Startups move fast—but nothing slows you down like pulling your best engineer off product to chase a SOC 2. In this spot, a founder’s big deal hangs on compliance, an engineer is deep in flow...and one voice of reason steps in with the answer: Vanta. Vanta automates compliance so you can get audit-ready in days, unblock deals, and keep building. Your engineer will thank you.

Unleash your innovation with You Did WHAT With Tines?! Fall 2025

It’s fall, the leaves are starting to turn, school is back in session, but that also means our bi-annual workflow competition You Did WHAT With Tines?! (YDWWT) is here for the Fall 2025 season! This competition challenges our community of builders - from customers to partners - to bring forth their most impressive workflows, in the hopes to be recognized among the best of the best.

CMMC Is Here: Enforcement Begins Nov 10-What This Means to GovCons with FCI & CUI

The U.S Department of Defense (DoD) has officially published the final CMMC Acquisition Rule, 48 CFR/ DFARS 252.204-7021 in the Federal Register. The rule goes into effect November 10, 2025—just 60 days from publication. July 22, 2025 marked a major milestone when the rule was submitted to OIRA for review. It cleared review in just 24 business days, was available for public inspection on September 9th, and published officially on September 10th.

Why DFIR: A Guide to Digital Forensics and Incident Response Services and Retainers

No organization likes to contemplate being successfully hit with a cyberattack, but turning a blind eye to the possibility is the exact wrong thing to do. Digital Forensics and Incident Response (DFIR) planning and retainers, like car, home, and health insurance, are a necessity in case the unthinkable happens.