Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Are attacks on industrial systems increasing? #cybersecurity #podcast #OT

Public awareness of industrial system attacks is finally catching up to what security professionals have known for years. On The Cybersecurity Defenders Podcast, Justin Searle, Director of ICS Security at InGuardians, traces the shift from Conficker in 2008 taking out OT systems on flat networks to Stuxnet in 2010 making the warfare implications clear. Since then, awareness among governments and critical infrastructure operators has grown steadily, and so have the attacks.

See, Govern, and Secure All AI Usage in Your Enterprise

Do you happen to know which AI tools your employees are using right now, or what data they're sending into them? Cato AI Security automatically discovers every AI application in your environment, provides security teams with session-level visibility into how those tools are being used, and enforces data policies in real time, so employees can keep working and sensitive data stays where it belongs.

The 7 Best AI Governance Tools in 2026

AI adoption has accelerated faster than most organizations’ ability to manage it. Security and compliance teams are now responsible for overseeing machine learning models, large language models (LLMs), agentic AI systems, and shadow AI—often with frameworks and processes that weren’t built for any of it. The gap between deploying AI and governing it responsibly is where risk lives. AI governance tools exist to close that gap.

What Happens When Healthcare Systems Go Dark

• What happens inside a healthcare system when ransomware takes down Active Directory and authentication fails? In this episode, Josh Howell sits down with Nelson, Executive Healthcare Strategist at CDW, to explore real-world cyber incidents and the architectural shifts required to recover safely. You’ll learn: YouTube Chapters Final Lessons for Healthcare Leaders If you enjoyed this episode, be sure to subscribe to our YouTube channel.

Understanding Malicious Packages in Modern Software Supply Chains

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Fast Answers, New Problems with AI in the SOC

AI is moving into security operations fast, but the gap between a strong demo and something you can trust in production is still bigger than most teams want to admit. That gap is where risk starts. Eddie frames that early by pushing back on the idea that AI is about reducing headcount and arguing that the teams getting the most value are using it to amplify their best people instead.

Why builders win with Andrew Cook

Join us for this week's Defender Fridays as we explore the builder mindset in cybersecurity with Andrew Cook, CTO at Recon InfoSec. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

The AI SOC explained: Intelligent security for modern threats

The SOC was originally designed for a threat landscape that no longer exists. Today, the sheer number and speed of modern threats make it tough for even the best analysts to keep up. Manually sorting through huge amounts of data, dealing with alert fatigue, and relying on fixed rules make it harder to understand the full story behind each threat. The AI SOC addresses this problem, but not in the way most vendors describe. It’s not just a simple product or feature.