Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What We Found with OpenAI's Codex CLI Tool

In this video, I explore OpenAI’s Codex CLI tool to see how powerful it really is for coding with AI. But things quickly go off the rails… what started as a simple test ended with a surprise identity verification request. Apparently, to continue using the tool, I need to submit a government-issued ID and a photo of myself—something I didn’t expect at all. I talk through the process, show the error I ran into, and share my honest thoughts on this level of access and how invasive it feels for a developer tool.

Fixing 4,000 Vulnerabilities? Quick Ways to Eliminate Security Issues! #podcast #infosec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Cisco Network Visibility Module Analytics (NVM)

Cisco Network Visibility Module Analytics (NVM): A new analytic story leveraging Cisco NVM telemetry to detect suspicious endpoint network behavior. This release includes 14 new analytics and mapped existing detections covering threats such as insecure curl usage, typosquatted Python packages, abuse of native Windows tools like rundll32 and mshta, and anomalous network connections from uncommon or argument-less processes.

Ep 2: Hacked together: fast, safe prototyping with AI

Join security experts Adam White, Chas Clawson, and Seth Williams as they explore how AI-first development is reshaping the way cybersecurity teams build, test, and deploy solutions. Traditional development cycles often leave critical ideas trapped in backlogs, but with Gen-AI and language models, security teams can now move from concept to prototype in hours, not months.

Ep 3: CISOs hate their security tools

Sumo Logic’s 2025 Security Operations Insights report surveyed 500 IT and security leaders from enterprise organizations to uncover what’s really happening inside today’s SOCs. Join security experts Adam White, David Girvin, and Zoe Hawkins as they break down the top findings from the report and shed light on what every analyst and CISO has felt for years: the system needs a reset.

Ep 1: So you're buying your first SIEM...here's how not to suck at it

You’ve been told you need a SIEM. Maybe it was your CISO. Maybe it was your auditor. Maybe your SOC is tired of stitching together logs with duct tape and Python scripts. Doesn’t matter — you’re now on the SIEM buying journey. Congratulations… and condolences. Join security experts, Adam White and David Girvin as they walk through the ultimate playbook for buying your first SIEM without lighting your budget (and your team’s morale) on fire.