Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

WatchGuard Threat Lab's top six cybersecurity predictions for 2026

WatchGuard has revealed its top six cybersecurity predictions for 2026, forecasting a year where AI-driven threats, regulatory pressures, and the decline of legacy tools will reshape the security landscape. Corey Nachreiner, chief security officer at WatchGuard Technologies, emphasises that organisations must prepare for rapid evolution in both attack methods and defensive strategies.

Is AI a cost-effective solution to alert noise? #cybersecurity #AI #SOC #podcast

Security teams are drowning in alerts, and AI might not be the answer everyone thinks it is. In this episode, Erik Bloch, VP of Security at Illumio, breaks down the math on why AI-powered alert triage may be financially unfeasible for most organizations. With 85 to 90 percent of alerts being non-malicious, security teams are still sorting through massive volumes of noise to find the real threats. Many vendors are betting that AI will solve this problem by triaging alerts at scale. But the reality?

The 9 Best Endpoint Security Solutions

Endpoint security solutions are specialized software designed to protect endpoint devices like computers, mobile phones, and tablets from cyber threats. These solutions prevent, detect, and respond to attacks by managing the security of these devices across the network. But with so many different endpoint security solutions available in the market, how can you know which is the right fit for your endpoint security strategy?

The Efficiency Shift: Protection That Scales with Your Team

Cybersecurity has a people problem. Threats scale faster than teams. Every new customer, every new endpoint, and every new alert adds pressure. Efficiency is no longer a nice-to-have; it is the only way to maintain effective and sustainable protection. That is where endpoint security efficiency comes in. Endpoint security efficiency is the ability to deliver maximum protection with minimum operational effort, turning noise into clarity and alerts into meaningful incidents.

Intel Chat: AI takes over entry work, AI cyber espionage, JackFix & weaponizing Blender files [272]

Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

From Pressure to Potential: Turning Compliance into Opportunity with MDR

The pressure to meet cybersecurity and data protection rules keeps growing. more attacks, more remote work, and more connected systems have expanded the attack surface for every business. Regulators and customers now expect organizations to prove they can monitor, detect, and respond to threats at all times. For many small and midsized businesses, that level of coverage is hard to achieve without dedicated staff and around-the-clock operations.

Black Friday: How to Protect Your Retail Clients from Ransomware

Black Friday is one of the most demanding seasons for the retail sector. Massive spikes in online traffic, aggressive promotions, and pressure to keep services available significantly increase the risk of an attack. Cybercriminals are aware of this and exploit the saturation to launch ransomware campaigns, phishing attempts, and supply chain attacks that aim to disrupt operations, steal sensitive data, and cause maximum impact.

AI hype & the future of SecOps, what's changed in 30 years? With Erik Bloch from Illumio [271]

On this episode of The Cybersecurity Defenders Podcast we speak with Erik Bloch, VP of Security at Illumio, about better tools to combat burnout rate and discuss the reality of AI in security. Erik Bloch has 30+ years of information and cyber security experience, both as an IC and as a leader of teams. “People first” has always been his approach. He has led entire security and IT functions at smaller companies, and been the CISOs leading big teams at larger orgs.

Why doesn't point-in-time compliance work? #cybersecurity #compliance #podcast

PCI compliance has never been about passing a single audit and forgetting about it until next year. In our recent PCI DSS 4.0 session, author Branden R. Williams explained why point-in-time assessments create a false sense of security. Passing a compliance report doesn't mean you'll still be compliant two days later if something changes. Configuration drift happens. Systems change. Sometimes it's accidental. Other times, organizations deliberately configure things to pass an assessment, then revert to their old ways afterward.

How Computer Security Has Evolved and What You Can Do Now

You may not often think about how far computer security has come over the last 30 years; the evolution is remarkable. Early attacks, such as viruses, passed around on floppy disks, worms spreading for notoriety, and hacktivism done for a cause felt more punk rock than organized crime. Today, according to Canalys, ransomware is the top concern for small businesses. But will it stay that way?