Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Intel Chat: RediShell, Cisco 0-day, AI voice cloning, Brickstorm & teen hackers arrested [256]

Intel Chat - Episode 256: RediShell, Cisco 0-day, AI voice cloning, Brickstorm & teen hackers arrested A podcast about cybersecurity and the people that keep the internet safe. New episodes drop weekly. Chris and Matt dive into critical vulnerabilities, sophisticated threat actors, and emerging attack vectors. From a 13-year-old Redis vulnerability with active exploitation to China-linked espionage targeting infrastructure blind spots, this episode covers some of the most significant security developments impacting organizations today.

Stop Living-off-the-Land Attacks with Falcon Endpoint Security: Demo Drill Down

Modern adversaries have shifted away from traditional malware toward weaponizing legitimate tools like RMM software, Windows utilities, and administrative programs. These "living-off-the-land" attacks blend seamlessly into normal business operations, making them extremely difficult to detect with traditional security tools.

Security Visionaries | I Do Love To Be BSides the CSIDES (Interview with Samantha Swift)

Get an insider's look at community-driven cybersecurity events like BSides and CSIDES. In this episode of Security Visionaries, host Emily Wearmouth sits down with cybersecurity veteran and community organizer Samantha Swift (BSides organizer, DefCon volunteer) to unpack the power of community-driven security events. We dive deep into: If you are "cyber curious" or an industry veteran looking to connect, this episode is a must-listen!

Automate Security Response with Datadog Workflow Automation

Responding to threats often requires time-consuming, multi-step actions across multiple tools, slowing down investigations and increasing risk. Learn how security teams can automate a wide range of workflows, from everyday tasks to complex, multi-step investigations, so they can streamline response and reduce manual effort across tools and environments. In this demo, see how Datadog’s integrated SOAR, powered by Workflow Automation, helps you build, test, and manage automated security playbooks with confidence.

Tanium Ask Agent - Autonomous Endpoint Management - Tanium Tech Talks #142

Tanium has released jaw-dropping new agentic AI capabilities on the journey of Autonomous Endpoint Management (AEM). Actionable insights and recommendations at your fingertips! Achieve your Tanium goals even faster with assistance from the new Ask Agent: AI agent prompting for Tanium docs, data, and actions Deploy software Summarize dashboards Export executive summary reports RBAC aware Multi-threaded AI sessions And more!

Achieve IRDAI Compliance and Protect Insurance Apps with AppTrana

The insurance sector is facing a surge in cyberattacks. In 2024, Indusface tracked 495 million attacks on insurance websites and APIs. As threats become more targeted and automated, the IRDAI 2023 Information and Cybersecurity Guidelines have raised the bar for insurers to secure their applications and data. In this video, discover how AppTrana WAAP helps insurance companies achieve IRDAI compliance while staying resilient against real-world cyber threats.

How AI is transforming Elastic's Security team

Spending hours creating threat intelligence reports is a thing of the past with our InfoSec AI Assistant, built on Elastic’s Search AI Platform. Mandy Andress, our CISO, shares how the AI Assistant has transformed the way our security team gathers, documents, and reports on threats — cutting report-building time by over 75%. Learn how we’re using generative AI to build threat intelligence reports quickly, assess relevance and risk faster, and shift from reactive defenses to proactive security strategies.

Futurize, Unite, and Simplify Application Security: A Black Hat Discussion

In this video from Black Hat 2025, A10 Networks security expert Jamiso Utter explains the critical need to "futurize our defenses." He argues that many current cybersecurity solutions, such as firewalls and Regex, are built on decades-old technology, making them ill-equipped to handle today's emerging threats. Jamison highlights the problem with buying from companies whose "bottom line is more important than your bottom line," leading to a fragmented "best-of-breed" approach that ultimately adds complexity to a network.