Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

PGA of America Trusts LevelBlue as Official Cybersecurity Advisor

LevelBlue and the PGA of America share a commitment to excellence under pressure. As the Official Cybersecurity Advisor of the PGA of America, LevelBlue brings championship standards of protection, continuity, and trust to the organizations that keep the game - and business - moving forward. From fairways to firewalls, LevelBlue safeguards mission-critical operations, member data, and high-profile events with always-on defense, accelerated response, and expert-led security operations powered by AI-driven threat intelligence.

How AI is Re-Building the Cybersecurity Landscape with Max Lamothe-Brassard from LimaCharlie [280]

On this episode of The Cybersecurity Defenders Podcast we're starting the new season off with the hottest topic of 2025: AI. Join an in-depth discussion January 20, 2026 and witness LimaCharlie's fundamentally different approach to AI-powered security operations. Sitting down with Maxime Lamothe-Brassard, Founder and CEO of LimaCharlie, we discuss the ways AI has rapidly changed how companies are building security tools.

Why Transparency Is Critical to Cyber Resilience in the Financial Sector

Transparency isn’t optional—it’s foundational to cyber resilience. In this clip from the Exposed: Cyber Risk in the Financial Sector and its Supply Chain webinar, Roland Cloutier, Global CSO and Digital Business Enablement Executive (TikTok, ADP, EMC), explains why visibility across the financial ecosystem is essential for managing third-party risk and preventing cascading cyber attacks.

Cyber War is Already Here. CISOs Must Prepare for Cyber Conflict

Cyber warfare isn’t coming—it’s already here. This conversation on The Cyber Resilience Brief dives into the Fifth Domain of Warfare—and why nation-state cyber activity should matter to every organization. From Russia’s chaos-driven campaigns to China’s long-game persistence, Iran’s retaliatory attacks, and North Korea’s financial theft—your network isn’t a bystander.

A New Era for AI Coding? GPT 5.2 vs. Security Vulnerabilities

Can OpenAI’s GPT 5.2 actually build a production-ready, secure application from a single prompt? In this video, we put the latest model to the test by asking it to build a full-stack Node.js note-taking app. We evaluate its dependency choices, dive into a surprising fix for a long-standing CSRF vulnerability, and run a full security audit using Snyk. Is this the new gold standard for AI coding models?

2025 Ends With a Bang - The 443 Podcast - Episode 353

Title: 2025 Ends With a Bang This week on the podcast, we cover a wave of attacks against network edge equipment and internet-exposed systems including an update on the recently patched Firebox 0-Day. After that, we cover two stories on browser extensions siphoning off data and making unwanted modifications to victim’s web browsing activity.

The Bid Picture Featuring Memcyco's Gideon Hazam

This episode unpacks the accelerating threat of phishing, account takeover (ATO), and digital impersonation in the age of AI. Gideon Hazam, Co-Founder at Memcyco, explains why brand impersonation is still treated as “lower urgency” by many organizations, how that blind spot enables real-world fraud, and what preemptive, real-time defense looks like when attackers operate at machine speed.

Jeremy Brown, CTO at GitGuardian, on AI, NonHuman Identities, and the Governance Gap in 2026

AI isn’t creating new security problems, it’s exposing existing ones at scale. GitGuardian saw 24M secrets leaked on public GitHub last year (+25%), and private repos are far more likely to contain secrets because people get careless when they feel safe. AI also enables more non-developers to ship apps without security training and generates oversized PRs that can’t be realistically reviewed, increasing leak risk. Attackers increasingly don’t “hack”, they use leaked credentials to log in and blend in like normal users, making traditional incident response less effective.