Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Intel Chat: RediShell, Cisco 0-day, AI voice cloning, Brickstorm & teen hackers arrested [256]

Intel Chat - Episode 256: RediShell, Cisco 0-day, AI voice cloning, Brickstorm & teen hackers arrested A podcast about cybersecurity and the people that keep the internet safe. New episodes drop weekly. Chris and Matt dive into critical vulnerabilities, sophisticated threat actors, and emerging attack vectors. From a 13-year-old Redis vulnerability with active exploitation to China-linked espionage targeting infrastructure blind spots, this episode covers some of the most significant security developments impacting organizations today.

A CISO's Guide to the DoW's New CSRMC Framework

The Department of War’s (DoW) new Cybersecurity Risk Management Construct (CSRMC) marks a watershed moment for cyber defense. This move confirms that static, checklist-based security is obsolete. To defend against modern threats, organizations must adopt the continuous and proactive posture management approach experts have been recommending for years.

Stop Living-off-the-Land Attacks with Falcon Endpoint Security: Demo Drill Down

Modern adversaries have shifted away from traditional malware toward weaponizing legitimate tools like RMM software, Windows utilities, and administrative programs. These "living-off-the-land" attacks blend seamlessly into normal business operations, making them extremely difficult to detect with traditional security tools.

CISA Emergency Directive 2503: What It Means for Cisco ASA and Firepower Devices

CISA Emergency Directive 25‑03 mandates that federal civilian executive branch (FCEB) agencies immediately identify and mitigate vulnerabilities in Cisco ASA and Firepower devices. The vulnerabilities, which affect SSL VPN components, can be exploited by attackers to gain unauthorized access and pivot across networks. CISA’s actions are based on observed exploit activity in the wild and the critical role these devices play in public sector infrastructure.

Corelight reconnects visibility across the entire AWS cloud environment

Today, we are pleased to announce the launch of Corelight’s new AWS Flow Monitoring Sensor, a new addition to Corelight’s flow monitoring capabilities. This new sensor was purpose-built to address the longstanding visibility challenges that have frustrated security teams running their most critical workloads in AWS. AWS provides one of the world’s most popular cloud platforms, hosting applications and sensitive data for some of the largest organizations.

How To Compare PAM Solutions on the Market

Privileged Access Management (PAM) is an essential part of modern enterprise security, helping organizations monitor and control privileged access to systems with sensitive information. As companies scale their infrastructure across on-premises, hybrid and cloud environments, selecting the right PAM solution can have a long-term impact on enforcing compliance and reducing security risks.

Security Visionaries | I Do Love To Be BSides the CSIDES (Interview with Samantha Swift)

Get an insider's look at community-driven cybersecurity events like BSides and CSIDES. In this episode of Security Visionaries, host Emily Wearmouth sits down with cybersecurity veteran and community organizer Samantha Swift (BSides organizer, DefCon volunteer) to unpack the power of community-driven security events. We dive deep into: If you are "cyber curious" or an industry veteran looking to connect, this episode is a must-listen!

Automate Security Response with Datadog Workflow Automation

Responding to threats often requires time-consuming, multi-step actions across multiple tools, slowing down investigations and increasing risk. Learn how security teams can automate a wide range of workflows, from everyday tasks to complex, multi-step investigations, so they can streamline response and reduce manual effort across tools and environments. In this demo, see how Datadog’s integrated SOAR, powered by Workflow Automation, helps you build, test, and manage automated security playbooks with confidence.