Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Sunil Pai about Agents, AI, and New Developers

Clip of the show/podcast with Sunil Pai. About exploring AI, agents, developers, and how AI is helping developers, and turning more people into developers. Sunil is the founder of PartyKit (an open source deployment platform for AI agents), acquired by Cloudflare in 2024. And he’s a Principal Systems Engineer that is building AI agents at Cloudflare.

#210 - The current cybersecurity landscape with Ian L. Paterson, CEO of Plurilock

On today’s episode of The Cybersecurity Defenders Podcast we speak with Ian L. Paterson, CEO of Plurilock, about the current state of Cybersecurity. Ian is a data entrepreneur with more than 15 years of experience in leading and commercializing technology companies in the fields of data analytics and cybersecurity. Ian is the CEO of Plurilock, where he led the company’s growth and its successful listing on the TSX Venture Exchange.

Secrets are Dead: Why Machine and Workload Identities are the Future of Cloud Security

Static secrets like API keys, tokens, and passwords have become a major security liability in modern cloud environments. These credentials introduce significant security risks, are difficult to manage at scale, and create compliance headaches. The future of cloud security lies in dynamic, cryptographic machine and workload identities, eliminating static secrets and enforcing zero-trust authentication across your infrastructure.

Corelight's Vincent Stoffer on Why Enterprises Can't Rely Only on Endpoint Security

The cybersecurity industry's heavy reliance on endpoint detection and response tools has created significant vulnerabilities, particularly around IoT devices and operational technology that cannot be monitored using traditional security tools, according to Vincent Stoffer, field CTO at Corelight. This growing attack surface, combined with sophisticated threat actors who exploit any available entry point, has pushed organizations to reevaluate their security strategies and consider more comprehensive network monitoring approaches.