Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Intel Chat: Salt Typhoon, Scattered LapSus Hunters, WhatsApp compromise & AI-assisted attack [245]

Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Would You Like Data Leaks With That?

It’s been a rough few weeks for burger chains. First, McDonald’s McHire chatbot was caught serving up candidate data through insecure APIs. Then Restaurant Brands International (RBI), home of Burger King, Tim Hortons, and Popeyes, had its APIs flame-broiled by attackers who discovered they could generate tokens without authentication, escalate privileges, and even eavesdrop on live drive-thru audio. When APIs become the secret sauce, leaving them unprotected is a recipe for disaster.

Using AI in Security Operations: A Practical Checklist for the Modern SOC

AI is transforming how security operations centers (SOCs) work, but the hype can outpace the reality. You don’t need to build custom models or deploy cutting-edge platforms to benefit. Chances are, you already have AI-powered capabilities in your SIEM, SOAR, or security data platforms. The question is: Are they doing anything useful? This practical playbook lays out six key priorities to increase productivity and effectiveness while maintaining control.

LimaCharlie's AI: What It Does

Sr. Technical Content Strategist Everyone advertises AI, how does LimaCharlie use it? If you are not exhausted by the relentless AI hype cycle by now, your resilience is commendable. Our industry is awash in AI marketing that is an inch deep and a mile wide*. Everyone claims to have AI, almost no one will explain how it works. At LimaCharlie transparency is a core value. You see it in our high-visibility security platform and publicly available pricing structure.

How to deploy NAKIVO Backup & Replication in multi-tenant mode

You can deploy NAKIVO Backup & Replication in multi-tenant mode to centrally manage backups for multiple customers or business units while ensuring data isolation, scalability and cost efficiency. Watch this video to learn to install the NAKIVO solution in multi-tenant mode on Windows and on Linux.

Oracle Linux Server Hardening

Server hardening’s core principle is, “unnecessary functionality compromises security.” Adopting Linux should greatly simplify the process. No matter which flavor of Linux you choose to run, hardening your servers should be the same process; once you know one, you know them all. When it comes to Oracle Linux Server Hardening, what works for Red Hat or CentOS should continue to work. In theory, yes, but in practice, there are significant differences that could make or break your project.

Automotive Privacy in California: The UX Benchmark That Could Change Everything

Every modern car is a data machine. It records where you go, when you go, how you drive, and often, who is with you. This information flows quietly from vehicle to manufacturer. In California, the law is clear. The California Consumer Privacy Act (CCPA) has been in effect since 2020, giving people the right to see, limit, and delete personal data. But a right is only as strong as the tools that allow you to use it.

How to Calculate Cycle Time in Software Development

The Jit Team, a group of security pioneers, is dedicated to guiding developers and organizations in their pursuit of seamless and secure cloud app development. Our expertise spans from product security to DevSecOps, enabling you to fortify your software at every stage. Security experts dedicated to shaping insightful editorial content, guiding developers and organizations toward secure cloud app development. Dive into a wealth of knowledge and experience in fortifying software integrity.