Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Going Beyond Prevention: Five Essentials for a True EDR Solution

The cybersecurity landscape has evolved, but many endpoint tools have not. Most still focus on known threats and signatures, blocking familiar malware and flagging suspicious files. They rely on static models that can only go so far. That approach worked for yesterday’s threats, but not for today’s attackers.

Intel Chat: RediShell, Cisco 0-day, AI voice cloning, Brickstorm & teen hackers arrested [256]

Intel Chat - Episode 256: RediShell, Cisco 0-day, AI voice cloning, Brickstorm & teen hackers arrested A podcast about cybersecurity and the people that keep the internet safe. New episodes drop weekly. Chris and Matt dive into critical vulnerabilities, sophisticated threat actors, and emerging attack vectors. From a 13-year-old Redis vulnerability with active exploitation to China-linked espionage targeting infrastructure blind spots, this episode covers some of the most significant security developments impacting organizations today.

What's Going On at Salesforce? - The 443 Podcast - Episode 347

This week on the podcast, we discuss the wave of extortion attacks targeting companies that use Salesforce. After that, we discuss Discord's breach involving their customer support application. Finally, we dive deep into the recent Oracle E-Business Suite zero-day vulnerability and how attackers chained together multiple low-severity findings into a critical issue.

Extending Zero Trust to Every Endpoint

Learn how to evolve your Zero Trust strategy with expert insights from LevelBlue. As organizations grow and face new compliance challenges, securing access to data and applications is more critical than ever. In this Zero Trust webinar, our cybersecurity experts explore how to build a unified, resilient Zero Trust framework using managed security services that combine endpoint security and network security.

We need to redefine "critical infrastructure" #cybersecurity #ransomware #criticalinfrastructure

When a city gets hit with ransomware, residents can't pay utility bills, access emergency services, or even get married. When the water treatment plant goes down, the hospital can't operate, no matter how well you've secured it. We've been asking the wrong question. Instead of "does this technically qualify as critical infrastructure?" we should be asking "who needs help?" Small organizations like schools, nonprofits, water systems, and local governments face the same cybersecurity challenges but lack the resources to defend themselves.

Identity automation in the age of agentic AI with Matthew Chiodi

Defender Fridays - Identity Automation in the Age of Agentic AI with Matthew Chiodi Join us for this session of Defender Fridays as we explore identity automation in the age of agentic AI with Matthew Chiodi, Chief Strategy Officer at Cerby. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Roadmap to Community Cyber Defense with Sarah Powazek, Program Director, UC Berkeley CLTC [254]

Cybersecurity Defenders Podcast - Episode 254: Roadmap to Community Cyber Defense with Sarah Powazek, Program Director, UC Berkeley CLTC A podcast about cybersecurity and the people that keep the internet safe.

How to Strengthen Security Through IT Infrastructure Management

Strong information technology (IT) management is crucial for modern business security. Every connection, device, and system forms part of a network that must be carefully maintained and monitored. Without proper oversight, even the most advanced technologies can become weak links that expose sensitive data to risks.