Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ep 28: Stop being the 'no' department: How modern GRC enables growth

On this episode of Masters of Data, we sit down with Cassandra Mooseberger, Manager of Security Compliance at Sumo Logic, to unpack governance, risk, and compliance (GRC). Cass breaks down her three-pillar framework: governance and compliance, risk management, and trust. She reveals how GRC teams can flip from cost center to sales enabler through trust pages, automated questionnaires, and proactive support. We explore practical strategies for working with engineering: listen first, understand before changing, and skip the "rip and replace" impulse.

How to build secure agent swarms that power autonomous systems in production

We worked with the Autonomy team to show how 1Password can secure agent swarms using a safer pattern: just-in-time, least-privilege access, without inheriting broad device, cloud, or infrastructure permissions, and without hardcoding secrets into agents.

Acronis True Image - How to Do a Backup

Acronis True Image: Your digital bodyguard. Protect everything that matters. Backup. Recover. Defend. All with one click. It’s not a matter of if something will happen, but when. The real question is — are you prepared? With Acronis True Image, you have everything you need to protect your digital life and keep your data safe from unexpected events. Today’s world is full of risks — from hardware failures to cyberattacks. That’s why Acronis True Image combines secure backup with advanced cybersecurity, giving you complete protection in one easy-to-use solution.

Acronis True Image - Product Overview

Acronis True Image: Your digital bodyguard. Protect everything that matters. Backup. Recover. Defend. All with one click. Your digital life deserves more than just backup — it needs complete protection. That’s where Acronis True Image comes in. Designed for today’s connected world, it combines fast, reliable backups with integrated cyber protection, including anti-ransomware, anti-malware, and identity protection*. In this video, we’ll show you how easy it is to safeguard everything that matters: Backup tab: Create automatic or manual backups in just a few clicks.

What A Real Nation State Cyber Attack Looks Like

A realistic nation state style attack is less cinematic blackout and more slow grind, with degraded services, conflicting information and outages that are hard to prioritise. Public confidence erodes as friction spreads and misinformation amplifies the chaos, and history shows societies fail when trust in key systems collapses faster than those systems adapt.

Claude Code builds security infrastructure with Git-based configs #cybersecurity #ai #secops

See Claude Code provision a new LimaCharlie security tenant with regional data residency, enable detection extensions, generate API credentials, create SSH keys, and establish Git as the single source of truth. Security teams can manage their entire LimaCharlie detection infrastructure through version-controlled code rather than point-and-click interfaces.

Claude Code configures AWS S3 export for security detections #cybersecurity #ai

Claude Code automates the entire detection export pipeline from LimaCharlie to AWS S3. The agent confirms AWS access, creates buckets with proper regional placement, provisions IAM policies with appropriate permissions, stores credentials securely, and enables continuous delivery. Security data flows from LimaCharlie to S3 for retention and analysis without manual AWS configuration.