In this episode of Defending the Edge, we cover breaches to breakthroughs, unpacking the Great Firewall of China data leak, the looming consequences of the CISA Act’s lapse, the rise of the “Shai-Hulud” worm, bold cybersecurity predictions, and the arrival of Sora 2, the AI platform reshaping the digital frontier.
All content for Defending The Edge is the property of DefendEdge and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this episode of Defending the Edge, we cover breaches to breakthroughs, unpacking the Great Firewall of China data leak, the looming consequences of the CISA Act’s lapse, the rise of the “Shai-Hulud” worm, bold cybersecurity predictions, and the arrival of Sora 2, the AI platform reshaping the digital frontier.
On the first episode of Season Three of the Defending The Edge Podcast with DefendEdge, the team is welcomed by Krysten Barragan, a threat landscape analyst, as they talk about recent attacks and some new threat actors emerging on the scene. As 2025 is now present, listen in as topics such as which threat actors made their names known in 2024 and what groups are predicted to stay on the top of headlines as the new year progresses. Stay tuned for our next episode as we talk about various ...
Defending The Edge
In this episode of Defending the Edge, we cover breaches to breakthroughs, unpacking the Great Firewall of China data leak, the looming consequences of the CISA Act’s lapse, the rise of the “Shai-Hulud” worm, bold cybersecurity predictions, and the arrival of Sora 2, the AI platform reshaping the digital frontier.