Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Applications in Cybersecurity with Adam Winston - The 443 Podcast - Episode 331

This week on the podcast, recent guest Adam Winston hops back on to continue our discussion on Artificial Intelligence in cybersecurity. This week, we focus on how attackers are using AI, what to worry about and what not to lose sleep over, and guidance for evaluating AI for use within your own organization. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

AI and Human Expertise: A Key Alliance in Cybersecurity

While many cybersecurity tasks - like log monitoring, event correlation, or alert classification - are repetitive and operational, they can be exhausting for professionals in the field. Artificial intelligence (AI) has become a key enabler for automating processes, reducing false positives, and optimizing incident prioritization. However, this does not mean cybersecurity can do without essential human abilities such as creativity and critical thinking.

Cloud Detections in an Age of Cloud Tools with Fred Wilmot

Fred Wilmot, CEO and Co-Founder of Detecteam, joined Defender Fridays to discuss the growing concerns surrounding identity management in cloud security, particularly with the rise of attacks on platforms like O365 and Azure. He emphasizes the importance of analyzing network traffic to understand identity behavior and the complexities introduced by encryption and third-party authentication. He also notes the ongoing evolution in cybersecurity practices and the potential benefits of standardization in logging and taxonomies.

Do we need an AI compliance framework?

Compliance isn’t just a checkbox. It’s the frontline of cybersecurity defense. In this episode of the Cybersecurity Defenders podcast, Joshua Hoffman, Chief Revenue Officer at ControlCase, shares critical insights on the evolving role of compliance in cybersecurity. From frameworks like CMMC and SOC 2 to the rising pressure from new SEC regulations, we examine how organizations can move beyond surface-level audits and adopt a scalable security posture.

Identity Theft Is a Growing Business Threat: 5 Real-World Security Essentials

Identity theft is no longer just a problem affecting individual users – it’s a serious business threat. When companies lack a comprehensive, centralized security strategy, they remain exposed to identity-based attacks. Add to this the challenge of protecting both personal and corporate data in hybrid or remote work environments, and the risk becomes even more difficult to manage. According to the U.S.

Eliminate Standing Admin Rights and Enforce Least-Privilege Policies With Endpoint Privilege Manager

Keeper’s Endpoint Privilege Manager is an advanced Privileged Elevation and Delegation Management (PEDM) solution that provides secure, just-in-time privileged access across your endpoints, significantly reducing the threat of ransomware, insider threats and data breaches – all without sacrificing productivity or performance.

LimaCharlie Leaps Ahead With Endpoint Protection

The newest extension to LimaCharlie’s SecOps Cloud Platform (SCP) offers users advanced control over Windows endpoint protection at scale. This powerful new capability allows security service providers to easily manage free instances of Microsoft Defender Antivirus (previously Windows Defender) on all Windows endpoints through a single unified interface.

CrowdStrike Named a Customers' Choice in 2025 Gartner Voice of the Customer for Endpoint Protection Platforms Report

A unified endpoint protection platform (EPP) is the essential foundation to a strong cybersecurity strategy. The industry standard for delivering AI-powered cybersecurity is the CrowdStrike Falcon platform, which has become the choice for organizations large and small to automate and consolidate their security across endpoint, identity, cloud, and data.