Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Legacy DLP Leaves You Exposed

Legacy DLP tools are blind to how data moves in today’s cloud-first world—leaving gaps attackers exploit. From shadow IT and SaaS sprawl to insider threats and misused personal devices, outdated solutions miss the subtle, high-risk behaviors that matter most. True protection requires context-aware visibility, behavioral insight, and data lineage that follows sensitive information everywhere it goes—not just where it started.

How to Build a Security Team That Actually Enables the Business with Olivier Busolini

In this episode of The Connectivity Cloud Podcast with Cloudflare, host Mark Dembo is joined by Olivier Busolini, Group Head of Information Security at Mashreq, to explore how cybersecurity leadership has transformed from a purely technical function to a strategic business partnership.

The future of the digital estate: Automomous Endpoint Management | Tanium & endpointX

In this TechMonitor vodcast, brought to you in partnership with Tanium and endpointX, we dive into the evolving world of autonomous endpoint management (AEM). Join Dan Jones (Senior Security Advisor, EMEA at Tanium) and Dan Stead (Director at endpointX) as they explore: Whether you're in the public or private sector, this conversation offers valuable insights into how to secure and streamline your enterprise with modern tools.

Developers: Build Trust, Foster Security Culture, Stay Updated! #developers #appsec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Why Identity Threats Are Harder to Detect

When a single identity is linked to multiple accounts across your environment, visibility gaps can occur, opening opportunities for attackers to exploit. This risk is especially high for executives and privileged users with access to your most sensitive data. In this clip, our expert Tyler Reese explains why identity correlation is essential for proactive threat detection and ITDR. Learn how identity mapping and account cataloging enhance SOC visibility and help prevent cross-account attacks.

July 7, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: Critical Sudo Vulnerability Allows Priv Esc to Root The flaw arises from unsafe handling of the --chroot (-R) option, where sudo processes user-provided configurations (including nsswitch.conf) from within the chroot environment before validating user privileges. This allows a local attacker to construct a malicious chroot with crafted NSS configuration that forces sudo to load attacker-controlled shared libraries as root, effectively bypassing authentication.

Rewind: Microsoft Kernel Shift, GPT-4o Threats, and Scattered Spider - The 443 Podcast - Episode 334

First, we look back at Microsoft’s major shift to remove endpoint protection from the Windows kernel. When we first covered it, it was a proposed change—now it's happening, and the implications are big. Next, we revisit a segment on GPT-4o and how generative AI is fueling the next wave of social engineering attacks. It's smarter, faster, and more convincing than ever. And finally, a refresher on the arrest of a Scattered Spider leader. While that made headlines, the group's activity hasn’t slowed down, they're still very much on the radar, as we discussed just last week.

Compliance Isn't Security: Why Businesses Must Think Beyond the Basics

Industry compliance frameworks like GDPR, HIPAA, and PCI DSS have become the go-to benchmarks for cybersecurity. But here's the hard truth: meeting compliance standards doesn't guarantee your data is secure. While these frameworks set essential guardrails, they often fail to address fast-evolving cyber threats that target businesses every day. For modern enterprises, staying secure requires going beyond checkbox compliance.

Beyond the Hype: Why Adaptive AI is Essential for Modern SOCs

Artificial Intelligence (AI) has revolutionized Security Operations Centers (SOCs), automating threat triage and response. But not every AI is equipped to handle today’s evolving cyber threats. Many SOC platforms still rely on static, pre-trained models designed for yesterday’s attack patterns, leaving modern organizations vulnerable.