Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Unexpected hurdles creating U.S. cyber policies

The early days of U.S. cyber policy were defined by agencies that had no common language and no playbook to follow. J. Michael Daniel, President and CEO of Cyber Threat Alliance and former White House cybersecurity coordinator, talks through what it actually took to coordinate cyber policy across the federal government, build public-private partnerships that work, and stand up an intelligence sharing organization that serves the entire cybersecurity industry.

Project Glasswing. What Anthropic's Mythos Means for Cybersecurity

What happens when an AI model can find more vulnerabilities in a day than a red team could find in a year? Welcome to Razorwire, the podcast where we share our take on the world of cybersecurity with direct, practical advice for professionals and business owners alike. I’m Jim and in this episode, I’m joined by Martin Voelk, penetration tester and AI red teamer, and Jonathan Care, lead analyst at KuppingerCole covering AI and cybersecurity.

China-Linked Hackers Could Be Using Your WiFi Right Now

China-linked cyber groups have been hijacking everyday home routers—Linksys, Netgear, even small Cisco devices—and turning them into global proxy networks. That means an attacker can: This isn’t theoretical. In 2024–2025, massive botnets made of thousands of home routers were dismantled. The scariest part? Most people had no idea their device was involved.

Customer zero: ServiceNow's autonomous IT journey with Tanium

What does it look like to be customer zero for enterprise IT and security? In this video, Glen Taylor, VP of Digital Technology Systems & Services; Sankha Nagchoudhury, SVP of Digital Technology; and Madhuri Manikonda, Sr. Director of Digital Technology & AI Operations at ServiceNow, share how ServiceNow operates at massive scale—supporting 30,000 employees while defending against constant cyber threats—and how Tanium plays a critical role in making that possible.

GitGuardian Now Flags Overprivileged and Admin Secrets Across AWS, Entra, And Okta Identities

GitGuardian NHI Governance will now automatically flag machine identities that carry admin access and have more privileges than they actually use. GitGuardian NHI Governance has been able to surface policy breaches for long-lived secrets, Duplicated Secrets, and, of course, if the secrets have been leaked publicly or internally.

Defending at Machine Speed in the Autonomous Age

Frontier AI models are accelerating the discovery of new vulnerabilities combined with the ability to exploit those weaknesses at speed and scale. This alone isn’t the problem. Trust in AI‑driven security outcomes is. With AI dominating headlines, security leaders are asking what models like Mythos or GPT‑5.4‑Cyber mean for their business. The real issue runs deeper. Teams need to be able to trust tools and technology that move at machine speed.

Ep. 55 - The 'Typhoon' Hack: How China Hid Inside Your Home Router

Your home router isn’t just sitting there. It might already be part of a global cyberattack. In Part 2 of our deep dive into Chinese cyber operations, Tova Dvorin and Adrian Culley unpack the “Typhoon” threat groups—Volt Typhoon, Salt Typhoon, and Flax Typhoon—and how they’re quietly reshaping modern cyber warfare. This isn’t about stealing data. It’s about staying hidden, pre-positioning, and being ready to strike.