Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP 24 - FOMO, identity, and the realities of AI at scale

In this episode of Security Matters, host David Puner sits down with Ariel Pisetzky, chief information officer at CyberArk, for a candid look at the fast‑evolving intersection of AI, cybersecurity, and IT innovation. As organizations race to adopt AI, the fear of missing out is driving rapid decisions—often without enough consideration for identity, security, or long‑term impact. Ariel shares practical insights on what it really takes to secure AI at scale, from combating AI‑enabled phishing attacks to managing agent identities and reducing growing risks in the software supply chain.

The CTI Pivot: Weaponizing Decoy Data Against Airline ATO

That question reflects a growing reality inside airline security teams. Account takeover is no longer a downstream fraud event. It is an access-layer problem driven by adversaries who specialize in impersonation, reverse proxies, and rapid monetization of loyalty accounts. For Cyber Threat Intelligence teams, the mission is not to clean up after fraud. It is to disrupt adversary capability early, attribute campaigns accurately, and break the kill chain before customer harm occurs.

A Step-by-Step Guide to Enabling HIPAA-Safe Healthcare Data for AI

Healthcare organizations are under immense pressure to improve care quality, reduce costs, and operate more efficiently. AI is speeding and simplifying all activities and is integrated across most workflows. But there’s a tradeoff: the moment patient data enters an AI workflow, your HIPAA obligations intensify. HIPAA violations are not theoretical.

It's About Time: Why Memcyco Raised $37M, and Why Now

Digital fraud hasn’t stood still. Attackers have adopted automation, refined tooling, and improved coordination across phishing, impersonation, and account takeover (ATO). In that sense, fraud has become smarter in how it’s delivered and scaled. But this form of sophistication isn’t primarily about more complex technical breaches, and it doesn’t explain why losses continue to rise even as enterprises deploy increasingly advanced security controls.

Business Logic Abuse: The Attack You Can't Patch #businesslogic #apisecurity #cybersecurity

The attack that no patch can fix Scenario:"Give me one million pizzas" API responds: "OK, one million pizzas at $0.01 each" Attacker: "Thanks!" What happened? API works exactly as designed Syntax is correct Protocol is followed WAF sees nothing wrong BUT the business logic intended: "Max 100 pizzas per order, at normal pricing".

Powerful antivirus guidance for Macfirst organizations in 2026

Businesses with a Mac-first strategy have long enjoyed the perception of inherent security from the Unix-based operating system. However, as 2026 unfolds, the digital threat landscape evolves rapidly, and Mac-first organizations are now facing a range of sophisticated cyber risks.

How to integrate third-party APIs in Drupal

Learn how to create and manage Custom REST API endpoints in Drupal using the Custom API module. This step-by-step tutorial shows how to build APIs without writing complex backend code, using Drupal’s core REST and routing system. Comprehensive Documentation: Don't forget to subscribe to our channel and click on the bell icon to get notifications about new uploads.