Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

miniOrange, Securing the SDLC End-to-End | Podcast with Rakesh Falke

Security can’t be an afterthought. In this podcast, Puja More in discussion with miniOrange Engineering Manager Rakesh Falke on embedding security across the SDLC-from architecture (DFDs, sensitive data, GDPR) to secure coding, secrets management, and production hardening. Learn common developer pitfalls, app vs infra security, IaC (Terraform), and how AI tools (Cursor) plus Burp Suite speed up vulnerability detection.

30 Years of Cybersecurity Leadership. Built For What's Next.

Thirty years in cybersecurity doesn’t matter unless it changes something. Technology anniversaries often focus on looking at the past, product launches, or company milestones. But cybersecurity doesn’t reward longevity alone. It rewards outcomes, including safer organizations, stronger partners, and security models that actually work in the real world.

Simplifying how businesses pay creators and contractors worldwide with Trolley - S2E10

In this episode, we're excited to introduce Barnett Klane, VP of Product at Trolley, the leading payouts platform powering the internet economy. Trolley enables businesses to automate global payments to creators, freelancers, and contractors across 210+ countries and territories, serving major companies. Barnett previously founded MyManual and held product roles at Bugcrowd, bringing deep expertise in building products at the intersection of payments, compliance, and creator platforms.

Configuration Rot: Why Security Tools Quietly Stop Working

Security tools don’t usually break. They just slowly stop doing what you think they’re doing. Or perhaps were never set up to do what you needed in the first place. Something got deployed. It worked. Then it drifted. No one noticed. And three years later, you’re questioning the renewal because you’re not even sure what it’s protecting anymore. That’s configuration rot. Thanks to Julian Lee at eChannelNews for the fun, thoughtful and much needed conversation on this topic and more.

WatchGuard's Biannual Internet Security Report 2025 H2 - The 443 Podcast - Episode 359

This week on the podcast, we cover the WatchGuard Threat Lab's Internet Security Report for the second half of 2025. In this episode, we cover the latest trends in malware at both the network perimeter and endpoints, network attacks, and the top malicious domains from the period before, and end with some tips everyone can use to defend their networks.

Security Roles in SharePoint Architecture: SharePoint Security Matrix

Microsoft SharePoint has a mature, well-structured security model. It gives organizations control over who can access sites, libraries, and documents, and for most day-to-day needs, it works well. But there is a fundamental limitation built into how SharePoint security works: it controls access based on role, not on the sensitivity of the content itself.

Engineer Custom Attack Validation at Scale - with the Developer-First VS Code Workflow for Breach Studio

The new SafeBreach extension for VS Code integrates Breach Studio’s powerful custom attack development capabilities directly into the world’s most popular IDE to enable security teams to engineer custom attack simulations with unprecedented speed and precision. Security engineers can leverage Git-native version control, AI-assisted authoring, and real-time IntelliSense linting to eliminate friction and reduce failed executions.

The Myth of Self-Healing Code: Why Claude Code Security Isn't Replacing Application Security

Anthropic recently launched Claude Code Security, an AI-powered vulnerability scanner that can analyze your codebase, trace data flows across files, find bugs, and even propose patches. It represents a meaningful advance in how developers can get security insights earlier in the development process. But let’s be clear: this is not a replacement for a comprehensive application security program.

Welcoming Sevco Security: Expanding the Aurora Platform with Visionary Exposure Management

By Dan Schiappa, President, Technology and Services, Arctic Wolf Security operations is undergoing a fundamental shift. For years, organizations have focused primarily on detecting and responding to threats after they occur. But as attack surfaces expand across endpoints, cloud, identity, SaaS, and infrastructure, that reactive model is no longer enough.