Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

Let's SOC About It

Technology

Activity Overview

Episode publication activity over the past year

Episodes

Prompt Kiddies & AI Phishing: How Cybercriminals Are Using AI to Outsmart Your Security Stack

26 Feb 2026

Contributed by Lukas

Amy Tom sits down with Ali Alame, co-founder and CTO of CyberArmor, to talk about what's actually happening in the world of AI-generated phishing ...

How do you unify Security Operations?

12 Feb 2026

Contributed by Lukas

They say modern SOCs are drowning in alerts. But what if the real problem is not the tools, it is the lack of strategy and unification?In this episode...

Attack Paths, Not Alert Summaries (Why Morpheus AI Beats L1 Bots) with Gordon Benoit

15 Jan 2026

Contributed by Lukas

In this episode, D3 Security's President – Gordon Benoit – explains why the next step for the SOC is not just faster triage, but autonomous in...

Can AI Agents predict threats before they happen?

20 Nov 2025

Contributed by Lukas

They say that Agentic AI is the new hot topic of cybersecurity. But what does that really mean? How does Agentic AI work? Can AI take over cybersecuri...

What does AI in the SOC look like?

06 Nov 2025

Contributed by Lukas

AI is changing the way SOCs function, pushing organizations to rethink technology, processes, and people. Filip Stojkovski, Founder of SecOps Unpacked...

Where does D3 Security fit in the AI SOC landscape?

24 Oct 2025

Contributed by Lukas

In this episode of the Let’s SOC About It podcast, Francis Odum gets a first look at Morpheus AI, D3 Security’s AI SOC platform. Amy Tom and David...

What happens inside cyber scam mills?

14 Aug 2025

Contributed by Lukas

In this episode of the Let's SOC About It podcast, Amy Tom chats with Sarim Khawaja, a Product Lead at Styx Intelligence, about the dangers of cyb...

How does reverse malware engineering work?

29 Jul 2025

Contributed by Lukas

Threat detection teams are on the frontlines of detecting, inspecting, and publishing findings on new threats. But how do they get there? And what doe...

How are data brokers fueling social engineering attacks?

03 Jul 2025

Contributed by Lukas

Online data brokers may seem like a consumer privacy issue –but as our guest explains on this episode of Let's SOC About It, they’re a growing bus...

How do we combat identity-based attacks?

12 Jun 2025

Contributed by Lukas

Identity-based attacks aren't slowing down. In fact, as Chip Bircher tells us on this episode of Let's SOC About It, it's not something yo...

What Is the EDR Telemetry Project?

05 Jun 2025

Contributed by Lukas

EDR telemetry data is essential to investigating alerts and responding to threats. Kostas Tsialemis is the independent security consultant behind the ...

How is AI used in phishing attacks?

08 May 2025

Contributed by Lukas

AI is used in phishing attacks by both bad actors and incident responders alike. So what do phishing attacks look like today, and how do we combat the...

What to look out for at RSAC 2025

23 Apr 2025

Contributed by Lukas

With RSAC right around the corner, we sat down with Francis Odum to talk about his tips for a good conference.In this episode, we discuss:🔥 The hot...

How do you create an effective automation strategy?

10 Apr 2025

Contributed by Lukas

It’s back to basics this week because you can’t successfully automate without the right foundation and an effective automation strategy. Mandy Nee...

Could a deepfake hijack your CEO?

27 Mar 2025

Contributed by Lukas

AI and deepfake technology is getting more and more advanced. We often associate "getting deepfaked" with celebrities and well... anyone but...

How can MSSPs best leverage media?

13 Mar 2025

Contributed by Lukas

Like it or not, whether you’re dealing with a product launch or a security breach, media has a big influence on cybersecurity. Jessica Davis, former...

The AI-Augmented SOC: How far are you willing to go?

26 Feb 2025

Contributed by Lukas

The AI-Augmented SOC is here, and with the current wide-spread range on AI adoption in the SOC, Francis Odum joins the Let's SOC About It podcast ...

Could Employee Biometric Data Compromise Your Organization’s Security?

16 Jan 2025

Contributed by Lukas

Biometrics data hacking is evolving– and, if you’re not careful and aware of the risks, it could potentially be used in an attack against your org...

How Can Offering Threat Modelling as a Service Boost Your MSSP?

02 Jan 2025

Contributed by Lukas

It’s a new year, and with that brings an opportunity for MSSPs to re-evaluate their growth strategies to reach new customers and diversify their off...

How is modern IAM shaping the fight against phishing?

19 Dec 2024

Contributed by Lukas

Identity and access management (IAM) is stepping up and adopting AI & automation to tackle the ever-growing “Phishing Problem”. Amy chats with...

How can we approach third-party risk in an AI-driven world?

05 Dec 2024

Contributed by Lukas

We’re joined this week by Ketan Nilangekar, the Co-Founder and CEO of ThreatWorx, to answer the question– how can we approach third-party risk man...

How can you adopt AI in cybersecurity responsibly?

21 Nov 2024

Contributed by Lukas

Enter the world of AI in cybersecurity with Anthony Green, President of the ISACA Vancouver Chapter. From managing data protection to setting up the r...

How has cloud adoption influenced SOAR and SIEM development?

07 Nov 2024

Contributed by Lukas

They say that innovation isn’t just about adopting the right technology, it's about adopting a change mindset that allows you to adapt to the evolvi...

Why is it so hard to get a job in cybersecurity?

24 Oct 2024

Contributed by Lukas

Whether you’re new to cybersecurity, want to switch things up, or find yourself looking for a job well into your career, this episode of ‘Let’s ...

How do CEOs make strategic decisions?

10 Oct 2024

Contributed by Lukas

For episode 1 of Let's SOC About It, we're bringing you a real banger🔥 Amy Tom (your Community Manager and Host extraordinaire) sits down with Ed ...