Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security Potpourri: SOCs, automation, and penetration testing with Cliff Janzen

Cliff Janzen, CISO and VP of Security Services at Arctiq, joined us for Defender Fridays for a special "Security Potpourri" session! What's on the menu? > SOC operations and optimization> Security automation strategies> Penetration testing insights> The current state of security landscape> All through Cliff's expert lens and real-world experience.

Enrich, Parse, and Control Logs with Observability Pipelines for Datadog Cloud SIEM

See how Datadog Observability Pipelines helps security and operations teams take control of their log data. In this demo, we’ll walk through: With Datadog, you can normalize, enrich, and prepare high-quality log data for Cloud SIEM, supporting faster investigations, more accurate detections, and reduced operational overhead—all without third-party software.

Scattered Spider: the Evolution of Identity-Based Ransomware

Identity-based ransomware is no longer a fringe tactic; it’s becoming the playbook of today’s most dangerous adversaries. Scattered Spider, a financially motivated e-crime group, has shifted the model from smash-and-grab encryption to a far more devastating combination of double extortion, social engineering, and hypervisor encryption attacks.

MSP Zero Trust Analysis Map

Uncovering your clients’ hidden security gaps just got easier. Our new Zero Trust Gap Analysis Map helps you quickly identify where your clients are vulnerable, turning a complex topic into a clear, actionable conversation. In this video, we'll show you how to use this free, five-minute Google Sheets-based tool to assess a client's Zero Trust readiness. You'll learn how to pinpoint critical security gaps in key areas like identity, devices, and networks, generating an easy-to-read dashboard that highlights their biggest risks.

Threat Hunting at Scale: How Securonix + ThreatQ Turn Intelligence into Action

Discover how Securonix and ThreatQ empower security teams to overcome alert fatigue, reduce manual workloads, and proactively hunt for threats at scale. In this session, experts from Securonix and ThreatQ demonstrate how combining advanced behavioral analytics with context-rich threat intelligence helps SOC teams detect stealthy attack chains, automate investigations, and respond faster. You’ll learn.

FDA Part 11 Compliance Checklist | Complete Guide

If your organization operates in pharmaceuticals, medical devices, biotech, or life sciences, you can’t afford to ignore FDA 21 CFR Part 11 compliance. In 2025, over 78% of FDA warning letters in pharma and clinical trials cited data integrity and Part 11 gaps – mainly missing audit trails, improper electronic signatures, and lack of validation.

Everything Breaks Eventually - Building Resilient Infrastructure Beyond SASE

What does it really take to keep critical systems online—when the inevitable happens? Suzanne Aldrich, Strategic Solutions Engineer at Cloudflare, explores that question head-on in this preview of her Cloudflare Connect 2025 session. From outages to attacks, Suzanne shares real-world lessons on how to design for resilience, going beyond Secure Access Service Edge (SASE) to build systems that can bend without breaking.

Intel Chat: PromptLock AI ransomware, "Shai-Hulud", ChatGPT calendar vulnerability & FileFix [250]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.