Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The MemcycoFM Show: Episode 6 - Pre-emptive Account Takeover Detection: A Five-Step Guide

Modern security leaders know that account takeover detection (ATO) isn’t just about spotting a bad login. ATO attacks are part of a broader scam lifecycle – starting with phishing or impersonation, escalating into credential harvesting, and ending with unauthorized access. To stop ATOs effectively, security teams need visibility into this full progression, not just the login attempt. That’s why a true ATO prevention strategy starts long before a password is entered.

The #1 Way Companies Get Hacked (It's Not What You Think)

Plot twist: The biggest cyber threat isn't coming from hackers breaking in... It's coming from vendors you INVITED in! Most companies only discover their third-party risks during ransomware simulations - when it's too late to fix them. Here's the uncomfortable reality: You don't know who has access to your systems You don't know what they can actually touch You're one vendor breach away from disaster.

How Cloudflare Handles Privacy Certifications (and Why Containers Matter to Developers)

In this episode, host João Tomé is joined by Emily Hancock, Chief Privacy Officer at Cloudflare, Rory Malone, Principal Privacy Compliance Specialist at Cloudflare.They discuss Cloudflare's new privacy certifications. At the end, there's also Confidence Okoghenun, Senior Systems Engineer at Cloudflare, sharing the innovative Cloudflare Containers for developers.

Shift Security Left! Integrate Security Early in Your SDLC! #cybersecurity #securityteam

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Ransomware Strikes! What to Do in the First 60 Minutes: Understanding the Threat (Part 1)

Are you prepared for a ransomware attack? In this crucial first part of our "Ransomware Strikes! What to Do in the First 60 Minutes" series, we pull back the curtain on one of the most terrifying cyber threats facing businesses today. Join VISTA InfoSec, an officially empaneled organization with CREST, PCI Council, CSRO SG, SWIFT, and CERT-IN, as we dive deep into the reality of ransomware in 2024. We'll reveal staggering statistics, including the average cost of an attack ($5.13 million!) and the heartbreaking truth about small businesses.

EP 10 - A new identity crisis: governance in the AI age

In this episode of Security Matters, host David Puner sits down with Deepak Taneja, co-founder of Zilla Security and General Manager of Identity Governance at CyberArk, to explore why 2025 marks a pivotal moment for identity security. From the explosion of machine identities—now outnumbering human identities 80 to 1—to the convergence of IGA, PAM, and AI-driven automation, Deepak shares insights from his decades-long career at the forefront of identity innovation.

API Security Is a Business Problem-Not Just an IT One

APIs are more than technical components—they're business-critical assets. In this powerful moment, Jeremy Dodson lays out why frameworks aren't enough and why companies must treat API security as a core business priority. Security leaders: it’s time to shift your mindset and protect real data flows, not just check boxes.