Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Happens When Healthcare Systems Go Dark

• What happens inside a healthcare system when ransomware takes down Active Directory and authentication fails? In this episode, Josh Howell sits down with Nelson, Executive Healthcare Strategist at CDW, to explore real-world cyber incidents and the architectural shifts required to recover safely. You’ll learn: YouTube Chapters Final Lessons for Healthcare Leaders If you enjoyed this episode, be sure to subscribe to our YouTube channel.

Understanding Malicious Packages in Modern Software Supply Chains

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Fast Answers, New Problems with AI in the SOC

AI is moving into security operations fast, but the gap between a strong demo and something you can trust in production is still bigger than most teams want to admit. That gap is where risk starts. Eddie frames that early by pushing back on the idea that AI is about reducing headcount and arguing that the teams getting the most value are using it to amplify their best people instead.

Why builders win with Andrew Cook

Join us for this week's Defender Fridays as we explore the builder mindset in cybersecurity with Andrew Cook, CTO at Recon InfoSec. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Episode 11 - The AI Maturity Journey: Data, Agents, and the Shift from Craft to Art

Richard Bejtlich talks with Vijit Nair, VP of Product at Corelight, about the evolving "AI Maturity Journey" for modern security teams. Vijit outlines a three-level spectrum of AI adoption, moving from basic human-driven assistance to automated swarms of agents, and eventually toward fully autonomous systems. They discuss why high-quality, unopinionated data remains the essential foundation for building trust in AI and how technologies like the Model Context Protocol (MCP) are turning human language into the primary interface for tool integration.

Special Episode: A conversation with Sam, the AI SOC Analyst | Breach Ready Radio | Securonix

In this special episode, Ben sits down with Sam, the AI SOC Analyst inside Securonix, to walk through what happens when a detection fires and a real investigation begins. From a suspicious login at 2 a.m. to building context across users, endpoints, identities, and cloud activity, the conversation focuses on how investigations are changing in practice. We dig into what Sam actually does. How telemetry is pulled together. How behavior is compared to baselines. How risk is calculated. And how findings are turned into clear, structured recommendations that analysts can act on.