Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Partnerships, AI, and Emerging Threats with Peter Johnson - The 443 Podcast - Episode 371

Recorded at WatchGuard’s EMEA Partner Conference, in Dubrovnik, Croatia, this episode of 443 – Security Simplified features Peter Johnson from Schwartz GmbH for a conversation on how cybersecurity priorities are evolving across Europe. Peter discusses the increasing complexity organizations face when balancing security, compliance, and operational efficiency, along with the challenges of supporting customers and partners with varying levels of cybersecurity maturity.

Provably better data

Every security vendor says their data is better. Corelight decided to test that claim directly. Using real nation-state attack scenarios, including Salt Typhoon-related activity, the same AI model was evaluated against multiple security data sources to measure investigation accuracy, threat visibility, and incident response coverage. The only variable was the data.

Kevin Mandia on AI-Powered Attacks: The Race Just Got Faster | Black Hat | Reach Security

At Black Hat last year, we sat down with Kevin Mandia to talk about what's coming. His take: offense is going to accelerate with AI. Not slow down. Not plateau. Accelerate. When you've run more red teams than practically anyone on the planet, the pattern is clear. Getting into a victim network is already a race. AI compresses those time frames further. The attack surface isn't changing. Misconfigurations, things that slipped, controls that were on and got turned off. The entry point stays the same. AI just makes the race to exploit it faster.

Veriato Demo - Insider Risk Management (IRM)

See how Veriato IRM delivers behavioral visibility to help organizations detect and prevent insider threats before they escalate. This demo showcases Veriato’s Insider Risk Management platform in action, including AI-driven risk scoring, behavioral analytics, sentiment analysis, anomaly detection, and real-time alerting. Learn how security, compliance, and leadership teams can move beyond reactive monitoring to proactively identify risky behavior, investigate incidents faster, and strengthen organizational resilience.

Veriato Demo - Behavioral Visibility Across the Organization

Behavioral visibility is no longer just a security requirement. It is essential business intelligence. This demo showcases how Veriato delivers organization-wide visibility across security, HR, compliance, legal, finance, and operations teams. By capturing and analyzing behavioral data in real time, Veriato helps organizations uncover risk, improve operational clarity, and make smarter decisions. Inside this demo.

The Agentic Security Graph: Get Visibility into your AI Security Risks

As enterprises shift from conversational to agentic AI, the real risk moves from model outputs to the action layer; the MCP servers and APIs through which agents execute real-world tasks. The Agentic Security Graph frames this risk across three interconnected layers (LLM, MCP servers, APIs), showing how compromises at any layer can propagate and why existing LLM-focused controls leave the most consequential surface unmonitored.

Sophos Firewall Config Studio: Migrate to Sophos Firewall

A step-by-step tutorial on using Config Studio to convert configurations from supported third-party firewalls and import them into Sophos Firewall. Learn how to review migration results, fix flagged issues, and complete the process with confidence. Ask questions and get expert answers in the Sophos Community.

Agents need boundaries with Fotis Chantzis from OpenAI, Zero-Shot Learning

Agents need boundaries | Fotis Chantzis from OpenAI Agents don't fit old identity models. As OpenAI’s Agent Security Lead, Fotis Chantzis has a front-row seat to see how agents push identity systems beyond what they were built to control. That’s where things start to fall apart and where most teams lose control.