Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Secure Your AWS Cloud with Falcon Next-Gen SIEM: Seamless Integration & Intelligent Detection

See how Falcon Next-Gen SIEM delivers instant, frictionless integration with AWS for full visibility in minutes. Watch how pre-built detections analyze every API call, connecting events into clear attack stories. With automated response playbooks that take immediate action, you can detect faster, respond smarter, and stop cloud threats before they spread. CrowdStrike Falcon Next-Gen SIEM: Consolidate security operations with the world’s most complete AI-native SOC platform.

Reach Security Ranked #5 on the TechRound100 | Exposing and Fixing Real Security Risk

Honored to share that Reach Security has been named on the TechRound100, recognizing the most impactful and innovative startups of the year. This milestone reflects the problem we’re focused on solving: most organizations don’t lack tools—they lack visibility into how those tools are actually deployed. By exposing misconfigurations, shallow deployments, and missing protections, Reach helps teams fix the risks that matter most before they become incidents.

The Easiest Hacks Are the Most Dangerous

Some of the most successful cyberattacks aren't even that sophisticated. A misconfigured Zoom tenant. A forgotten 2FA. A Salesforce setting was left wide open. The problem isn't always the platform, but how we use it. Vladimir Krupnov and Blake Darché joined us in the latest episode of The Connectivity Cloud Podcast to unpack the myth that you need advanced tools to breach a system.

Risk Based Authentication Returns to the Forefront

Risk based authentication pairs login events with behavioural signals, stepping up security when anomalies appear in how users work. As organisations onboard part time staff and gig workers, continuous authentication and smarter policies help balance security with convenience for a diverse workforce.

Zero Trust That Actually Works: How Reach Maps NIST & CISA Frameworks Into Real Security Gains

Most organizations don’t lack intent; they lack a clear understanding of what’s deployed today, what gaps matter most, and how to turn guidance into enforceable baselines. Reach connects to your existing security tools and automatically maps configurations to established maturity models like CISA’s Zero Trust Maturity Model 2.0 — producing a real-time posture assessment across identity, device, endpoint, email, and network with no surveys or guesswork.

Intel Chat: AI takes over entry work, AI cyber espionage, JackFix & weaponizing Blender files [272]

Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Can Claude Opus 4.5 Build a SECURE Note Taking App?

Can Claude Opus 4.5 actually build a secure, fully functional note-taking app? In this video, I challenge the latest Claude model to create an app with real features — create, edit, update, delete, plus basic security — and see if the code holds up in practice. This is a real test of how far AI can go in building usable software.