In this episode of Defending the Edge, we cover breaches to breakthroughs, unpacking the Great Firewall of China data leak, the looming consequences of the CISA Act’s lapse, the rise of the “Shai-Hulud” worm, bold cybersecurity predictions, and the arrival of Sora 2, the AI platform reshaping the digital frontier.
All content for Defending The Edge is the property of DefendEdge and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this episode of Defending the Edge, we cover breaches to breakthroughs, unpacking the Great Firewall of China data leak, the looming consequences of the CISA Act’s lapse, the rise of the “Shai-Hulud” worm, bold cybersecurity predictions, and the arrival of Sora 2, the AI platform reshaping the digital frontier.
Today's episode of the Defending The Edge Podcast with DefendEdge, Lyndon, Katey, and Andrea discuss topics such as the U.S. presidential election, touching on post-election cyberattacks and polling threats. Additionally, topics such as the Middle Eastern conflict and improvements regarding robots learning how to clean water basins are touched on. Join us today for the second episode on the new bi-weekly basis that is developed and leans into the world of all things cybersecurity.
Defending The Edge
In this episode of Defending the Edge, we cover breaches to breakthroughs, unpacking the Great Firewall of China data leak, the looming consequences of the CISA Act’s lapse, the rise of the “Shai-Hulud” worm, bold cybersecurity predictions, and the arrival of Sora 2, the AI platform reshaping the digital frontier.