Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ofgem's Mollie Chard on driving resilience through diverse hiring practices

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Mollie Chard. Mollie’s career spans 10+ years in technical SOC and leadership roles at organizations like the UK’s Met Office, Capgemini, and OVO. She’s recently accepted a new role as Head of Cyber Guidance & Monitoring at Ofgem, the UK’s Office of Gas and Electricity Markets. A passionate advocate for diversity, she’s also the Chief Advisor for Women in Cybersecurity UK and Ireland.

Ep 6: The Gunslingers

During China’s pseudo-cyber-hiatus, the PRC’s hacking operations get a major overhaul. CCP leadership moves responsibility away from the sloppy, brazen hackers at the People’s Liberation Army to the far more stealthy, and strategic, Ministry of State Security. Gone are the “most polite” hackers in the digital world. Here to stay are the gunslingers – the elite of the elite in their field. In Episode 6, host and former New York Times cybersecurity reporter, Nicole Perlroth lays out what it looked like as China’s hackers went underground… and what we missed in Eastern Europe as they did.

Netwrix Launches the First MCP Server to Bring LLMs into Data Security!

Netwrix announces first MCP server to harness the power of Netwrix + LLMs for data security. Today, we're open-sourcing our first MCP server – and it’s powering up Netwrix Access Analyzer with conversational AI to help customers assess and remove sensitive data exposures. Netwrix is first to market in the data security security industry with an MCP server, enabling you to bring your favorite Generative AI tool to the critical task of securing your data.

April 14, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: Fortinet Warns of Active Exploitation of Known Vulnerabilities Fortinet has identified a post-exploitation technique used by threat actors targeting known, unpatched vulnerabilities in FortiGate devices. The threat actor leveraged a symbolic link trick to maintain read-only access to FortiGate devices, even after the original access vector was remediated.

Getting Started with Brivo Access

Welcome to your beginner's guide to Access, Brivo's powerful cloud-based access control platform! Whether you're a new user, installer, or just getting familiar with Brivo, this tutorial walks you through the essentials to get you up and running quickly. Explore the future of security and smart technology with Brivo. Our content delves into innovative solutions that empower businesses and individuals to create safer, more connected environments.