Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding how attackers think & how you avoid threats with Terry Bradley, Mile High Cyber [311]

Terry Bradley, Founder and President of Mile High Cyber, shares how you can uncover vulnerabilities and strengthen your organization's defenses with expert penetration testing and security assessments.

Build a security investigation agent that responds to detections (agent-as-code)

In this video we demonstrate how to build a custom security investigation agent using LimaCharlie’s agentic SecOps platform. Using the AI Agent Builder and a plain-language prompt, we create an investigation bot called SSH Bot that runs automatically whenever sensitive SSH credential material is accessed on an endpoint. When the detection fires, the agent: The agent is saved as code, allowing it to be triggered by detections, run asynchronously across infrastructure, or executed on a schedule.

Scaling Your Security Program to Match the Speed of Mythos

Anthropic’s Project Glasswing and the Claude Mythos model represents a fundamental change in the physics of cyber defense. With the gap between patch releases and weaponized exploits shrinking to hours, traditional manual security triage is now obsolete. Organizations must adopt AI-driven automated remediation.

Can AI Replace a QSA?

The question circling boardrooms and compliance departments in 2026 is no longer hypothetical: Can AI replace a QSA? After nearly two decades guiding organizations through PCI DSS audits, gap assessments, and remediation programs, the answer is clear — No, AI cannot replace a Qualified Security Assessor in 2026. But it is fundamentally reshaping what being a QSA means, and professionals who ignore that shift do so at their own peril.

CVE-2026-21643: Pre-Authentication SQL Injection in Endpoint Management Server Leading to Remote Code Execution

CVE-2026-21643 is a critical SQL injection vulnerability in the administrative web interface of FortiClient Endpoint Management Server version 7.4.4. It allows unauthenticated remote attackers to execute arbitrary SQL commands through specially crafted HTTP requests, primarily by injecting malicious payloads via the Site HTTP header.

Introducing PCI ASV Scanning: Continuous attack surface compliance in partnership with Clone Systems

Maintaining a secure external attack surface is no longer just about finding vulnerabilities; it’s about proving your resilience to partners, auditors, and regulatory bodies. Today, we are excited to announce Detectify’s PCI ASV Scanning, delivered in partnership with Clone Systems.

Optical Character Recognition (OCR) Explained

Most corporate work still revolves around documents. Invoices, contracts, onboarding forms, compliance records, and reports are used across teams every day. But a large portion of this information still exists as scanned files, PDFs, or even physical paper. And that creates a problem. You can store documents, but you cannot easily search, analyze, or automate them when the data is locked inside images or scanned files. That is where Optical Character Recognition (OCR) can help.

The Hidden Costs of Atlassian Cloud Migration: User Bloat, Sensitive Data, and How to Address Both

The single most common mistake in Atlassian cloud migration projects is treating migration as a straightforward technical exercise, exporting configurations, importing data, and switching environments. In practice, an unprepared migration transfers not just your data, but years of accumulated debt: inactive accounts, overstated license needs, and sensitive information that was never designed to exist in a shared cloud environment.