Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Rise of CTEM - Why AI Demands a New Approach to Security

What happens when your organisation adopts AI faster than your security strategy can keep up? Welcome to Razorwire, the podcast where we share our take on the world of cybersecurity with direct, practical advice for professionals and business owners alike. I’m Jim and in this episode, I’m joined by Martin Voelk, penetration tester and AI red teamer, and Jonathan Care, lead analyst covering the intersection of AI, cybersecurity and identity.

How To Build Your DevOps Toolchain Effectively

What can bring together development and operation teams better than DevOps, a prevalent agile methodology? It involves new management principles, cultural change, and technology tools that boost the team’s development, collaboration, and productivity while they cooperate on software development.

Building Smarter Virtual Assistants with Gemini 3 Flash API: AI for Seamless Workflow Automation

As teams become more distributed and workloads continue to increase, the need for effective automation tools has never been greater. Traditional methods of collaboration often fall short when it comes to handling repetitive tasks, managing high volumes of information, or providing real-time, intelligent support. That's where AI virtual assistants come in, changing how teams collaborate, streamline workflows, and boost productivity.

Claude Code Accidently Goes Open-Source - The 443 Podcast - Episode 365

This week on the podcast, we cover the accidental Claude Code source code leak and what it means for users and the wider ecosystem. After that, we discuss the Axios supply chain compromise impacting users of a JavaScript library with over 100 million weekly downloads. We end with our thoughts on Browser Gate, the name given to allegations that Microsoft is illegally harvesting LinkedIn customer data for a competitive advantage.

How Can Active Deception Validate Security Controls in Real Environments?

Security teams spend enormous effort deploying security controls. Endpoint protection tools. Network monitoring platforms. Identity security solutions. Detection systems. Logging platforms. The list continues to grow every year. But here’s the uncomfortable question many organizations eventually face: Are those controls actually working the way we expect? Security tools can generate alerts, dashboards, and metrics.

Attacks Don't Start Loud...Neither Should Prevention.

What if nothing ever looks malicious on its own? Most advanced attacks don’t start with obvious malware or clear signatures. They begin with activity that looks normal, until behavior over time reveals something more. In this demo, we show how Cato Dynamic Prevention stops threats by understanding behavior, not just inspecting isolated events.