Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Bid Picture Featuring Memcyco's Gideon Hazam

This episode unpacks the accelerating threat of phishing, account takeover (ATO), and digital impersonation in the age of AI. Gideon Hazam, Co-Founder at Memcyco, explains why brand impersonation is still treated as “lower urgency” by many organizations, how that blind spot enables real-world fraud, and what preemptive, real-time defense looks like when attackers operate at machine speed.

Jeremy Brown, CTO at GitGuardian, on AI, NonHuman Identities, and the Governance Gap in 2026

AI isn’t creating new security problems, it’s exposing existing ones at scale. GitGuardian saw 24M secrets leaked on public GitHub last year (+25%), and private repos are far more likely to contain secrets because people get careless when they feel safe. AI also enables more non-developers to ship apps without security training and generates oversized PRs that can’t be realistically reviewed, increasing leak risk. Attackers increasingly don’t “hack”, they use leaked credentials to log in and blend in like normal users, making traditional incident response less effective.

Identity Assurance: Reinventing Trust in a Cyber-First World

Identity is everything. Hamper it, and the individual is left with disrupted privacy, reputation damage, and endless fraud. Attackers are always on the lookout for access to resources and accounts via identity theft, credential theft, and Account Takeover Attacks (ATO). So, it is paramount to leverage solutions that securely link a user’s identity with who they claim to be. Identity assurance offers frameworks, components, and best practices to safeguard modern-day identities.

Cyber Resilience, AI Threats & Business Impact: Findings from 2025 LevelBlue Futures Report

Cyberattacks are evolving fast; powered by AI, deepfakes, ransomware, phishing, and growing software supply chain risk. So how prepared is your organization? In this webcast, we breakdown key findings from the 2025 LevelBlue Futures Report (in partnership with FT Longitude). The report is based on a global survey of 1,500 C-suite and senior executives across 16 countries and seven industries, including healthcare, financial services, energy, and manufacturing.

How to easily protect your identity from theft and fraud

Identity theft is no longer just about lost wallets or stolen credit cards—it’s a growing digital threat that can start with something as simple as opening an email, clicking a link, or sharing information online. Criminals can use your personal data to open accounts, make purchases, or commit fraud in your name, and may also use your information to commit crimes beyond financial fraud, often leaving victims unaware until serious financial or legal damage occurs.

CMMC Incident Response Timelines and Reporting Rules

Information security frameworks like CMMC are not just about enforcing security. They’re about enforcing accountability. That’s why a whole section of controls and rules that make up CMMC centers around incident response and reporting. You can’t just have security in place, but throw your hands up and do nothing if there’s an incident or breach. Nor can you sweep it under the rug and hope no one notices.

Workspace security in 2026: A complete guide for MSPs and modern IT teams

Workspace security has evolved into one of the most critical challenges facing managed service providers and modern IT teams. As organizations continue to embrace remote and hybrid work models, traditional perimeter-based security approaches no longer provide adequate protection. Users now access corporate data from multiple locations, devices and cloud platforms, dramatically expanding the attack surface. For MSPs, this shift represents both a risk and an opportunity.

Backup strategies for operational technology (OT) systems

Summary Operational technology (OT) systems underpin industrial safety and production, yet many run on legacy platforms that lack modern backup and cyber-resilience. Without isolated, full-system recovery, ransomware or system failure can halt operations and create serious safety risks — a gap addressed by modern OT backup approaches such as Acronis Cyber Protect.

Enterprise PCI Compliance: The Cost of Getting It Right in 2026

PCI used to fit neatly into a budget. You’d build your cardholder data environment, lock it down, gather evidence, and once a year prove to an assessor that everything worked. Costs were predictable because the work was concentrated: audit cycle, remediation sprint, then relative quiet until next year. That model broke somewhere around 2018. Now your payment flow touches cloud accounts, shared services, SaaS vendors, front-end code, and operational teams deploying changes on their own schedules.