Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How AI offers defenders even more growth opportunities with Michael Baker from DXC Technology [269]

On this episode of The Cybersecurity Defenders Podcast we speak with Michael Baker, VP, Global Chief Information Security Officer at DXC Technology, about his optimistic outlook on the impact of AI in cybersecurity.

Expert Roundup Practical Advice for PCI DSS 4.0 Enforcement in 2025

As PCI DSS 4.0 moves closer to full enforcement in 2025, many businesses are still trying to separate what truly matters from the noise. The new version introduces a stronger security mindset, more flexible implementation options and a greater emphasis on continuous monitoring. For many organizations, the challenge is not understanding the requirements but knowing where to begin.

Cyber Insurance: Why Backup Is Key To Lower Premiums & Higher Eligibility

As the rate of ransomware attacks keeps growing, the demand for cyber insurance is also greater. The State of Ransomware 2025 report by Sophos outlines that nearly 50% of companies in the report paid ransom. This underscores the need for stronger security measures — not only for data protection but also for cyber insurance eligibility.

Trust Exchange Paid: Scaling Security Communication

Today, Trust Exchange stands tall as a platform used by thousands of customers to communicate their security posture. Now we are introducing the new Trust Exchange Paid tier. This tier is designed to help you eliminate bottlenecks, accelerate deal cycles, and maintain top-tier security communication. For high-growth organizations, scaling communication means that security requests escalate rapidly. With UpGuard’s mission to drive proactive cybersecurity protocols, this is our next step.

How KnowBe4 Uses AI Efficiently to Get the Best Results

Using the right tool for the job is always better. Anyone who does DIY projects around the home knows how using the right tool can dramatically make the job you are doing far easier. Use the wrong tool, and that task suddenly becomes a burdensome nightmare. And after over 38 years in cybersecurity, I know that applies to cyber defense strategies, but I add one more axiom: Use the dumber, faster thing first for best results. Dumber things are usually faster at blocking a large number of things.

OWASP Named Software Supply Chain Failures. Now It's Time to Fix Them.

Since OWASP unveiled its 2025 Top 10, one of the most-discussed items has been A03: Software Supply Chain Failures. For many in AppSec, this came as no surprise; enterprise software’s reliance on open source has become one of its greatest strengths and arguably its biggest liability.

Cloudflare Firewall for AI Explainer and Demo

AI is powerful, but without protections in place, it’s risky. In this explainer and demo, you'll learn how you can secure your AI-powered applications with Cloudflare Firewall for AI. The demo will show Firewall for AI detecting and mitigating threats like PII exposure, unsafe/toxic content, prompt injection, and jailbreak. Further, you'll see Cloudflare’s powerful analytics capability and how Cloudflare's AI agent, Cloudy, can help investigate threats and build and deploy Firewall for AI security policies.

Why your security analytics needs proactive threat hunting

Even the mightiest and most prestigious companies and enterprises are not exempt from the sophisticated threats posed by cyber attackers. Your security team needs robust security measures for network security, endpoint security, threat detection, anomaly detection, data protection, security monitoring, application security and information security.

Protecting Your Privacy: Tips for Managing Phone Recordings

Your smartphone can capture sound with incredible clarity. Conversations, meetings, even quick reminders-everything can be recorded in seconds. But with this convenience comes a serious question: How safe are your recordings? In today's digital world, privacy protection has become one of the most discussed and crucial topics. Reports show that over 60% of smartphone users have used recording features at least once, often without realizing how much personal data those recordings may contain. Voices, locations, background sounds-all can reveal sensitive information.