In this episode of Defending the Edge, we cover breaches to breakthroughs, unpacking the Great Firewall of China data leak, the looming consequences of the CISA Act’s lapse, the rise of the “Shai-Hulud” worm, bold cybersecurity predictions, and the arrival of Sora 2, the AI platform reshaping the digital frontier.
All content for Defending The Edge is the property of DefendEdge and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this episode of Defending the Edge, we cover breaches to breakthroughs, unpacking the Great Firewall of China data leak, the looming consequences of the CISA Act’s lapse, the rise of the “Shai-Hulud” worm, bold cybersecurity predictions, and the arrival of Sora 2, the AI platform reshaping the digital frontier.
Join us on Episode 26 of the Defending The Edge Podcast with DefendEdge, Turkey and Transparency, as the team welcomes back co-host Gabe Fritz and dives into some recent data breaches, thanksgiving foods, and how to protect yourself from the heightened holiday attacks. Also mentioned in this episode are common threat actors such as IntelBroker as they make their way back into the cyber realm, as well as North Korean threat actor groups behind the ransomware dubbed "Play".
Defending The Edge
In this episode of Defending the Edge, we cover breaches to breakthroughs, unpacking the Great Firewall of China data leak, the looming consequences of the CISA Act’s lapse, the rise of the “Shai-Hulud” worm, bold cybersecurity predictions, and the arrival of Sora 2, the AI platform reshaping the digital frontier.