Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP 13 - Pizza parties and profit margins: The business of cybercrime

Cybercriminals today operate more like startups than stereotypes—complete with org charts, sprint cycles, and pizza parties to celebrate successful breaches. In this episode of Security Matters, host David Puner talks with former CISO and U.S. Air Force veteran Ian Schneller about the evolving sophistication of threat actors and what it takes to stay ahead.

CIO POV: What am I actually supposed to do with agentic AI?

For every enterprise CISO in the world right now, the burning question isn’t about cloud, TPRM, or internal threats. It’s about how to securely and responsibly adopt AI—specifically, agentic AI, the buzziest of today’s AI buzzwords. There’s no shortage of stats on skyrocketing adoption trends. Consider EY’s recent Technology Pulse Poll, which found that half of tech leaders have at least begun deploying agentic AI within their organizations.

Top 5 User Management Challenges in Atlassian Crowd (And How to Fix Them with Automation)

Managing users in Atlassian Crowd often feels like walking a tightrope. You’re expected to ensure seamless access for every team member, revoke access the moment someone leaves, manage directory syncs, assign and revoke group permissions, and keep everything audit-ready at all times. And while Crowd gives you a central place to manage users across Jira, Confluence, Bitbucket, and more, it still largely demands manual efforts from admins.

'Plague' malware exploits Pluggable Authentication Module to breach Linux systems

‘Plague’ represents a newly identified Linux backdoor that has quietly evaded detection by traditional antivirus solutions for over a year. Its primary mechanism involves operating as a malicious PAM, allowing attackers to silently bypass system authentication and establish persistent SSH access to compromised Linux systems.

CyberArk empowers Australia's cyber resilience with IRAP assessment completion at the protected level

As ransomware strains hospital operations and supply‑chain attacks target energy grids, Australia’s public and regulated sectors need proven cyber resilience. At the heart of most breaches lie human error and weak identity controls, making the Infosec Registered Assessors Program (IRAP) assessment program the gold standard for moving sensitive workloads to the cloud.

The life and death of an AI agent: Identity security lessons from the human experience

AI agents are on the rise. They can spin up, act independently, use tools, and make decisions—often without real-time human oversight. They promise incredible productivity but also introduce new risks and challenges that can’t be ignored. As these agents become more autonomous and integrated into enterprise operations, they blur the lines between human and machine responsibilities. This raises critical questions: How do we ensure they act ethically?