Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Drones vs. data centers, Iranian cyber, Sloppy Lemming & Honeywell vulnerability / Intel Chat [300]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Hackerbot-Claw Crosses the Line - The 443 Podcast - Episode 361

This week on the podcast, we chat about an OpenClaw bot that moved beyond vulnerability research and into malicious activity. Before that, we cover an AI-discovered vulnerability in the pac4j-jwt authentication library before ending with a discussion on an upcoming California law designed to help make age verification in the digital age easier, but with massive consequences.

Demystifying the Alphabet Soup That Is Detection and Response

It’s impossible to walk into a tradeshow these days without getting blasted by a wall of acronyms. Everywhere you look, vendors are cramming two to four perfectly serviceable words into a string of capital letters arranged to sound cooler than they actually are. This wouldn’t be so bad if it didn’t routinely derail meetings, product decisions, and sometimes whole strategies.

How to Scale as an MSP by Combining Firewalls and Integrated Security Services

Scaling MSP business has become increasingly complex in a landscape where threats evolve rapidly, and emerging technologies are constantly expanding the attack surface. According to the World Economic Forum’s Global Cybersecurity Outlook 2026, 61% of organizations identify the rapid evolution of the threat landscape and emerging technologies as the primary challenge to strengthening cyber resilience. In addition, 77% of respondents have observed a widespread increase in online fraud and phishing.

When Detection Isn't Enough: Limits of Microsoft Defender

Many MSPs rely on Microsoft Defender as a starting point for protecting customer environments. It’s built in, familiar, and good at generating alerts. But modern attacks don’t stop when an alert appears. They often use stolen credentials, legitimate tools, and cloud access to move quickly after detection. In this session, WatchGuard’s Worldwide MDR Channel Sales Manager Jen Rose will look at how attacks unfold in Microsoft Defender environments and why detection alone leaves gaps for MSPs and their customers.

Security Pricing That Actually Scales With Your Business #mssp #cybersecurity

Most vendors lock you into seat counts you'll never fully use. John Strand explains how LimaCharlie's flexible licensing lets Black Hills Information Security onboard and offboard endpoints without penalty, across SMBs and large enterprises alike.

Securing Endpoints With Keeper: Eliminating Local Admin Risk Without Slowing Users Down

Watch the recording of our exclusive webinar featuring Craig Lurey, CTO & Co-Founder of Keeper Security, and see how Keeper Endpoint Privilege Manager (EPM) removes standing admin privileges, enforces least-privilege access and blocks common attack paths, all while maintaining a seamless user experience.

The Machine War: Why MSPs Must Move from AI-Assistance to Autonomy

In 2026, the digital landscape has shifted from a world of "AI assistants" to one of autonomous operators. For managed service providers (MSPs), this evolution marks the end of the traditional "land and expand" human services playbook and the beginning of a high-speed era of machine-on-machine warfare.