Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CISOs Missing the Real AI Threat #podcast #aisecurity

This episode looks at what happens when AI starts finding vulnerabilities at scale, restricted access creates market imbalance, and security teams struggle to keep pace. It covers fragile infrastructure, bug brokers, overloaded analysts, CISO fear, and the growing sense that cyber defence is entering a faster and harsher era.

Ep 39: This is your first ransomware attack, not ours

On this episode of Masters of Data, we sat down with Steven Manley, CTO of Druva, to get the unfiltered truth about ransomware: it's not a matter of if you'll be breached, but when, and bad actors are now launching hundreds of attacks at a surprisingly low cost. We dig into why attackers lurk undetected for 200-plus days, how AI is being weaponized for everything from eerily convincing voice phishing to secretly training your own AI systems against you, and why your most protected assets are rarely what gets hit first.

The 7 Rs of AWS Application Migration: Choosing the Right Path for Each Workload

Most application migration projects fail the same way: someone picks a single strategy for the entire portfolio, then tries to force every workload into it. Lift-and-shift everything to meet a data centre exit deadline. Refactor everything because someone read a cloud-native manifesto. Retire nothing because no one wants to make the decision. AWS’s 7 Rs framework exists to prevent that.

The April 2026 AI Security Report: 6 Incidents and Detailed Attack Paths

From AI agents leaking internal data to coordinated global malware campaigns — here is everything that happened in AI cybersecurity between April 7 and April 21, 2026, with detailed attack paths for each incident. The fifteen days following April 7, 2026 produced six distinct AI-related security incidents spanning internal data exposure, supply chain exploitation, autonomous malware generation, coordinated multi-vector attacks, model leak fallout, and documented AI agent control failures.

Future of cybersecurity: Can AI outpace AI-driven threats?

Defending your corporate network is much like the human immune system fighting off a novel virus. For decades, traditional IT infrastructure relied on recognizing known signatures to neutralize incoming threats. The virus has now learned to mutate faster than traditional defenses can track. This rapid mutation represents the new era of artificial intelligence in cyber warfare. You need to align your IT strategy with business goals to ensure long-term adaptability.