Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Public infrastructure protection depends on analysts with Mike Hamilton, PISCES International [308]

Michael Hamilton, Chief Technology Officer at PISCES International, joins us to discuss the benefits of providing real world experience to students while they protect existing public infrastructure. The resilient future of local government security rests in our ability to adapt to changing threats and adopt new technologies, including AI.

Discover Your Network's Blind Spots Before It's Too Late

Advanced threats rarely break into infrastructure in obvious ways. In many cases, they remain hidden for months, exploiting blind spots created by unmanaged personal devices (BYOD), applications adopted without the IT department’s oversight (shadow IT), unauthorized access points, or compromised devices operating as part of botnets. As networks evolve into hybrid environments and most traffic is encrypted, the context becomes fragmented and the attack surface expands.

What is Endpoint Management? Complete Guide for IT Admins

Most organizations don’t struggle with managing devices in the beginning. A few laptops, some smartphones and tablets, everything feels under control. The problem starts when things scale. More devices get added. Teams start working remotely. Different operating systems and use cases come into play. Over time, it becomes harder to track what’s connected, what’s updated, and what’s secure. That’s when endpoint management stops being optional.

Claude Code Accidently Goes Open-Source - The 443 Podcast - Episode 365

This week on the podcast, we cover the accidental Claude Code source code leak and what it means for users and the wider ecosystem. After that, we discuss the Axios supply chain compromise impacting users of a JavaScript library with over 100 million weekly downloads. We end with our thoughts on Browser Gate, the name given to allegations that Microsoft is illegally harvesting LinkedIn customer data for a competitive advantage.

WatchGuard Recognized at the 2026 Cybersecurity Excellence Awards

We’re proud to announce that WatchGuard Technologies has been named Best Cybersecurity Company in the 2026 Cybersecurity Excellence Awards, recognizing innovation and leadership across the cybersecurity industry. While industry recognition is always an honor, this award comes at a particularly important moment for cybersecurity teams worldwide.

IRGC threatens tech companies, FBI Director hacked, Venom Stealer & Hasbro breach / Intel Chat [307]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

How to Secure Endpoints in Hybrid Work Environments

Picture a Tuesday morning at any mid-size U.S. company. A sales rep logs into Salesforce from a hotel lobby in Chicago on a personal laptop, no VPN. A developer pushes a commit from a home machine four months behind on OS patches. A finance analyst pastes a revenue spreadsheet into an AI tool that nobody in IT approved. Before 10 AM, you have three real endpoint security gaps. None of them triggered an alert. That’s hybrid work in 2026. And it’s not going away.

The Case for an Independent MFA Layer in Microsoft Environments

The quiet shift no one talks about. Something happened over the past few years that most MSPs didn't plan for. Their customers moved to Microsoft 365, adopted Entra ID as their identity provider, and started using Microsoft Authenticator for MFA. It made sense at the time. It was simple, it was included in the license, and it worked. But somewhere along the way, a strategic decision was made by default. Microsoft became the identity provider, directory, credential store, and MFA provider. All at once.

Cyberattacks tied to conflict in Iran, open source exploit & AI espionage / Intel Chat [#306]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

The US Ban on Foreign Routers - The 443 Podcast - Episode 364

This week on the podcast, we discuss the US government's ban on foreign-manufactured consumer routers and its likely impact. After that, we cover a research post from Huntress on a recent phishing campaign leveraging OAuth Device Authentication flows to retain long-term access to compromised accounts. We end with a review of key takeaways from Google's Cloud Threat Horizons report for H1 2026.