Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Thinking in pipelines for AI agents with David Burkett

Join us for this session of Defender Fridays as we explore thinking in agent pipelines with David Burkett, Cloud Security Researcher at Corelight and Founder of Magonia Research. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

XDR to Eliminate Silos and Strengthen Business Security in 2026

Organizations today operate in a threat landscape that is clearly more complex than it was just a few years ago. Advanced attacks no longer follow a single path or rely on a single entry point. Instead, they move across endpoints, identities, networks, and cloud services, exploiting fragmented environments and the lack of integration between different security layers. This evolution highlights the limitations of traditional approaches.

The Six Key Benefits and Core Capabilities of Endpoint Security

Endpoint security encompasses the processes and technologies used to protect end-user devices—including laptops, servers, mobile devices, IoT systems, and any connected asset with access to corporate resources. As organizations become more distributed and adversaries become more sophisticated, the endpoint has evolved into both a preferred target for threat actors and a pivotal control point within a modern security architecture.

U.S. Cyber Strategy, data center targets, Camaro Dragon & Stryker attacked / Intel Chat [301]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Automation vs. Augmentation: What AI Means for Your Team

AI is everywhere in cybersecurity. For partners, the real question is not about the technology. It is about your people. Is AI replacing analysts, or making them more effective? In this session, we break down the differences between automation and augmentation and why they matter for MSPs delivering security services. Automation removes repetitive SOC work such as triage, enrichment, and basic containment. Augmentation strengthens human experts with faster investigation, clearer attack mapping, and smarter response decisions.

Stryker's Network Disruption - The 443 Podcast - Episode 362

This week on the podcast, we cover the cyber attack that managed to wipe more than 200,000 resources off of the medical technology giant Syryker's network. After that, we review a research post on a good chrome extension gone bad. We end by discussing a recent Microsoft threat intelligence post on how North Korean-backed threat actors have operationalize AI for job scams.

Consolidation: The New Standard for MSP Efficiency

The real challenge for MSPs isn’t growth, it’s scaling effectively. As MSPs increase their client base and expand their service portfolios, managing multiple tools, consoles and vendors becomes progressively more complex, impacting operational efficiency and margins. In many cases, this isn’t the result of poor decision-making, but rather the evolution of the business.

Securing AI from within with Saurabh Shintre

Join us for this session of Defender Fridays as we explore securing AI from within with Saurabh Shintre, Founder and CEO of Realm Labs. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Bell Cyber & WatchGuard Partner to Deliver Enterprise Security for Canadian SMEs

Canadian small and midsize businesses are increasingly targeted by sophisticated cyber threats, yet most lack the internal resources required to deploy and operate enterprise-level security. Today, WatchGuard and Bell Cyber are addressing that gap through a new strategic partnership and the launch of CyberShield Connect, a fully managed cybersecurity service designed specifically for Canadian SMEs.

Why well-managed endpoints still get breached: The 2026 reality

As endpoints became more powerful, more mobile, and more exposed, they also became more prone to attacks. Endpoints remain one of the most targeted entry points for attacks. Attacks today are no longer random; they are targeted, deliberate, and increasingly powered by automated AI discovery tools that hunt for unmanaged gaps. Malware, ransomware, and phishing-based intrusions continue to increase, and their first level of interaction often happens on an endpoint.