Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Five-Year Plans, Forever Wars: China's Blueprint for Cyber Dominance

Chinese state-backed cyber operations are often misunderstood as a single, centrally controlled machine. In reality, they are fragmented, diverse, and strategically aligned with China’s national objectives, from economic development to critical infrastructure positioning. In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Mei Danowski, Co-Founder of Natto Thoughts and expert in geopolitical intelligence, to explore how China’s cyber ecosystem operates and how it is shaped by cultural, political, and economic structures.

Black Hat 2025 - From Chaos to Control - How Bank Of Hope Achieved Zero Critical Vulnerabilities

At Black Hat 2025, Nucleus Security and Bank of Hope shared how a small but determined security team transformed its vulnerability management program into a risk-driven, automated operation.

Intel Chat: Apache ActiveMQ, Elastic EDR vulnerability, kernel-level EDR killers & PipeMagic [241]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

The New CISO Podcast Ep.133 - Steve Lodin | Teachable Moments: How to Learn from Career Challenges

In this episode of The New CISO, host Steve Moore speaks with Steve Lodin, VP of Information Security at Sallie Mae, about the career challenges that shaped his leadership style and the lessons he’s learned across decades in cybersecurity.

Exploring Endpoint Security: From Basics to AI-Era Threats, With Raakesh Thayyil

From antivirus to AI-powered threats, this session with Raakesh Thayyil (Group Head of Security & Privacy at PropertyGuru) breaks down the evolving world of endpoint security—what it means today, how remote work changed the game, and what lean security teams can actually do about it. What you’ll learn: Timestamps & Q&A included in the video chapters! Brought to you by The 403 Circle – an invite-only community for top CTOs & CISOs.