Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CYBERCOM Insights: Federal Identity & Access Management

Hear from Brigadier General James B. Haynie and industry experts as they discuss the urgent need for modern Privileged Access Management (PAM) in federal agencies, exploring challenges, threats and strategies to enhance cybersecurity and support a zero-trust future.

RegScale's Travis Howerton on taking the pain out of compliance in highly-regulated industries

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Travis Howerton, Co-founder and CEO of RegScale. Travis began his security career with roles at government and regulated organizations, including the National Nuclear Security Administration and Oak Ridge National Laboratory, before being inspired by inefficiencies in compliance processes to co-found RegScale.

Making Generative AI Transparent with Gabrielle Hibbert

• • In this episode of Data Security Decoded, host Caleb Tolin sits down with Gabrielle Hibbert, a social policy expert and researcher, about her innovative work developing a nutrition labeling system for generative AI tools. This framework aims to bridge the gap between complex AI technology and consumer understanding, while addressing critical transparency and data privacy concerns. What You'll Learn.

Testing the Unthinkable Real World Lessons from Red Team Operations: 15 May 2025

Dom Mortimer, Red Team Manager, explores how red teaming simulates real-world adversarial tactics to improve detection and response capabilities and build resilience. Using case studies, learn how red teaming drives measurable improvements, fosters collaboration with security teams, and enhances organisational security culture.

May 19, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: Coinbase Insider Threat Leads to Theft of Customer Data Coinbase has released a blog post and filed an SEC Form 8-K reporting an incident whereby they received an email attempting to extort the company for $20m. According to the post, the threat actors approached customer support staff and “used cash offers to convince a small group of insiders to copy data in our customer support tools”. Stolen data includes personal details including identity documents and account data include balance and transaction history.

Why You Can't "SAST" Your Way Through AI Security #AppSec #LLMs #CloudSecurity #Cybersecurity

AI apps break the traditional rules of application security. Here’s why: AI is cloud-native from day one. That means you’ve got runtime risk before your app even launches. Static analysis (SAST) doesn’t cut it. You can’t predict risk from just looking at code. AI models are just vectors. You need new methods.