The Cybersecurity Defenders Podcast cover image

Malicious geopolitical cyber activity, cyberattacks tied to conflict in Iran, open source supply chain attack & AI autonomous espionage / Intel Chat [#306]

The Cybersecurity Defenders Podcast

00:00

Visibility, agent identity and defenses

Matt emphasizes inventorying agents, checking permissions, and placing detection between agents and tools.

Play episode from 28:41
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app