Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 ways to align your cybersecurity with World Economic Forum (WEF) guidance

2025 could be the most challenging year yet for the digital environment. As emerging factors such as the duality of AI, the rise in cybercrime, or the shortage of cybersecurity talent impact business, we ask the question, what should companies expect going forward?

#198 - AI risk and safety with John Vaina, AI Researcher & Red Teamer

On this episode of The Cybersecurity Defenders Podcast we talk with John Vaina, AI Researcher and Red Teamer, about AI risk and safety. John is an expert in AI risk, safety, and security. John currently works as an AI red team operator, tackling some of the most complex challenges in the field. His work spans traditional cybersecurity concerns, such as identifying vulnerabilities in AI systems, to cutting-edge tasks like testing for emergent behaviors and conducting AI alignment and safety audits.

Meet FireCloud Internet Access: The Future of Secure Remote Connectivity

With hybrid and remote work now the norm, organizations face an urgent challenge – how to provide employees with seamless, secure access to critical applications without the performance and security drawbacks of traditional VPNs. At WatchGuard, we recognize that businesses need a modern, scalable security solution that meets the demands of a distributed workforce.

#197 - Avoiding burnout and a managing stress with Amanda Berlin, CEO of Mental Health Hackers

In this episode of The Cybersecurity Defenders Podcast, we discuss stress management and avoiding burnout with Amanda Berlin, CEO of Mental Health Hackers. Amanda is the Senior Product Manager of Cybersecurity at Blumira, where she collaborates with a talented team to make security more accessible. With a career in IT spanning nearly her entire adult life, her expertise includes infrastructure security, network troubleshooting, purple teaming, and security awareness training.

Endpoint Security Management | 24/7 Protection for Every Device by LevelBlue

It’s not a matter of if your organization will face a cyberattack – it’s when. Our experts provide 24/7 endpoint security management, helping you defend your devices from advanced threats with automated solutions and expert support. Our Endpoint Security Solutions Include: • Endpoint Detection and Response (EDR) Why Choose LevelBlue? 24/7 Monitoring & Support Tailored Endpoint Security Solutions Expert Threat Intelligence & Response Flexible Protection Across Devices & Platforms.

LimaCharlie Playbooks demo

LimaCharlie Playbooks expand the use of Python in the SecOps Cloud Platform (SCP), letting users reduce the learning curve for leveraging advanced capabilities in our platform. While the current format of our detection and response rules remain highly effective, our playbooks make much of the same functionality available to Python scripts. Playbooks also give users extreme control and granular functionality over certain operations that LCQL does not.

#196 - Security challenges in the Arctic with Deepak Dutt, Founder of Zighra

On this episode of The Cybersecurity Defenders Podcast, we talk about security issues in the Arctic with Deepak Dutt, Founder of Zighra. Deepak is a technology leader and entrepreneur on a mission to secure the future against AI-powered threats and to inspire founders to transform their ideas from zero to meaningful impact. Deepak’s career began in the software space, inspired by his father’s passion for technology. In his late teens, he founded his first company in the eLearning space, which he successfully led to an acquisition, relocating to Ottawa at the age of 21.

How do misconfigurations affect your customers' security?

Incorrect configurations in digital systems represent a growing security threat, as even minor errors can help set up cyberattacks. These vulnerabilities arise when system, application, or network settings fail to follow security best practices, such as outdated default settings or failures in Cloud services, databases, or firewalls. These can expose your customers to serious risks, such as unauthorized access or theft of sensitive information.