Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The End of VPNs: Why Zero Trust Is the Future of Remote Access

The virtual private network (VPN) has been the default way to connect remote employees to company resources for over two decades. In its time, the VPN was a breakthrough ‒ creating encrypted tunnels back to the corporate network and giving road warriors a way in. But today's workplace looks very different. Employees access SaaS applications directly from the Internet. Teams are distributed around the world.

Protegrity Developer Edition Setup | Lightweight, Local, and Fast

Most developers know the pain of setting up enterprise security software—hours of dependencies, complicated installs, and endless permissions that slow projects down before they even start. Protegrity Developer Edition is different. It installs the way developers work: lightweight, local, and fast. In this demo, Dan Johnson, a software engineer at Protegrity, walks through the complete setup process.

The Essential Definition of AI Agents: Tools, APIs, and Workflow Automation

In this video segment from Securing AI Part 3: AI Agents – Use Cases and Security, A10 security experts, Jamison Utter, Diptanshu Purwar, and Madhav Aggarwal explore the topic of securing AI agents, which they define as systems that perceive, decide, and act. Diptanshu Purwar starts with a fundamental definition of an AI agent, clearly distinguishing it from a simple chatbot and setting the stage for the security challenges discussed in the series.

How Hands-On Learning Built My Cybersecurity Career | Marius Poskus

Marius Poskus shares how his cybersecurity career started through self-study and hands-on experience. Instead of chasing certificates, he built home labs, tested attacks and defences, and learnt through real experimentation — proving that curiosity beats credentials every time.

#258 - Intel Chat: Oracle EBS, Storm-2603, North Korean IT infiltration & LLM poisoning study

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

The Rise of AI Abuse: A story of Criminal GPTs, DeepFakes, Data Breaches, AI Malware, and Agentic Sleeper Agents

In late 2022, AI exploded into the mainstream with OpenAI’s ChatGPT, starting an AI-fuelled shift in both everyday life and the cyber threat landscape. Just as quickly as everyday users rushed to adopt the technology, so did threat actors. From generating phishing pretexts to writing malware and crafting deepfakes, AI systems have become both a new tool and a new target.