Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

If You're Worried About Mythos, Your Security is Broken #infosec #alert

This episode looks at what happens when AI starts finding vulnerabilities at scale, restricted access creates market imbalance, and security teams struggle to keep pace. It covers fragile infrastructure, bug brokers, overloaded analysts, CISO fear, and the growing sense that cyber defence is entering a faster and harsher era.

How a Hacker Used Standard AI to Dismantle a Government

The real shock is not a restricted model with scary branding, it is what standard public AI tools already make possible. A prolonged attack against government systems, tax records and voter data shows the threat comes from scale and persistence, not only from the newest frontier release.

Ep 40: What to expect when you are expecting an audit

On this episode of Masters of Data, we brought back GRC expert Cassandra Mooseburger to pull back the curtain on audits, and spoiler: it is far less scary than the IRS knocking on your door. We break down what actually separates a certification from an attestation from a report, how to run a prep process that does not send your engineering team running for the hills, and why the social capital you build across the business is just as important as the evidence you collect. If you have ever wondered how compliance work translates into closed deals and customer trust, this one connects those dots.

Bugs & Betrayal - Vect Analysis

Vect is a newly observed RaaS operation that emerged in December of 2025, with affiliate recruitment and victim postings following shortly after in January 2026. Following the 19th of March 2026 Trivy/LiteLLM supply chain attack conducted by TeamPCP, in which ~340 GB uncompressed data was stolen, Vect announced on the dark web forum “Breached” that they would be partnering with TeamPCP.

Observability is security (We just pretended it wasn't)

For years, we’ve drawn this artificial line that equates observability with uptime, performance, and SRE dashboards, while security is about threats, alerts, SIEMs, and “bad things.” While that separation was always convenient, it was never real. The same logs that tell you your service is slow are the same ones that tell you it’s compromised. We just routed them to different teams, different tools, and different budgets, then acted surprised when neither side had the full picture.

How CDW + Tanium Are Securing Hospitals and Cutting IT Costs by 30-50%

Healthcare IT is at an inflection point — rising costs, thousands of unmanaged devices, and ever-growing cyber threats are putting pressure on hospitals to act. In this video, CDW's healthcare team explores how their partnership with Tanium is helping health systems take control. Learn how the CDW + Tanium solution can help hospitals manage 20,000+ devices across a facility, protect against cyberattacks, reduce IT costs by 30–50%, and free up nurses and clinicians to focus on what matters most: patient care.

The Adversary's Speed Just Changed - What Mythos Means for Your Security Posture

The cybersecurity threat landscape just changed — and most organizations don't know it yet. In this conversation, Tanium's Pedro (CRO) and Mark Liu (VP of Solution Engineering) break down what Anthropic's Mythos really is, why security leaders everywhere are asking about it, and what organizations need to do right now. No marketing pitch — just a straight conversation about a consequential shift that's already underway.

Bot Management vs. ThreatX: How to Stop Business Logic Fraud

Bot Management vs. ThreatX: How to Stop Business Logic Fraud In this video, A10 Networks security expert Gary Wang explores the critical differences between dedicated bot management platforms and the ThreatX approach. If you are concerned about protecting your web applications from sophisticated fraud, this breakdown is essential viewing. Using a real-world scenario—a convenience store referral program being exploited by bad actors—Gary explains how attackers bypass standard defenses to commit "business logic" fraud.