POPULARITY
Categories
Today's show:Jason and Alex tackle a full tech and business news docket on today's show, including Jason's big SF trip with Launch Accelerator's 34th cohort, some peculiar social media posts from VC Geoff Lewis, a look inside the HUGE seed rounds being commanded by early-stage AI startups, crunching the numbers on how much compute data centers need to sell before they're profitable, Polymarket asks who will be the next CEO of X and MUCH MUCH MORE.Join us for the longest-running and most in-depth podcast on Earth for startup founders.Timestamps:(00:00) INTRO(01:31) Jason's in SF with LAUNCH Accelerator cohort 34… His take on the mood in Silicon Valley.(07:52) Odd X posts from Bedrock Capital's Geoff Lewis… what does it all mean?(10:09) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(14:44) Ask JCal: What founders can do to guard their own mental health and well-being(20:17) Northwest Registered Agent. Form your entire business identity in just 10 clicks and 10 minutes. Get more privacy, more options, and more done—visit https://www.northwestregisteredagent.com/twist today!(22:04) Thinking Machines Lab set a new record for a seed round: what's going on with these MEGA deals?(28:51) Alex (and Kabir from LAUNCH's research team) investigated the economics of data centers… just HOW MUCH can you make from selling compute? And how long does it TAKE to turn a profit?(30:52) Bolt - Don't be left behind. Build apps quickly without knowing how to code with Bolt.new. Try it free at https://www.bolt.new/twist.(37:09) Superintelligence vs. AGI: Jason thinks we're still more than 2-3 years away…(39:52) GPx is not a traditional VC fund: here's what industry vet Brian Singerman is up to(49:37) The importance of setting your own corporate culture… before it gets set for you!(58:15) Polymarket has ideas for the next X CEO… see where Jason ranks on the list!(01:03:18) Reddit wants to know… Do investors judge founders negatively who rely on lots of AI tools?Subscribe to the TWiST500 newsletter: https://ticker.thisweekinstartups.comCheck out the TWIST500: https://www.twist500.comSubscribe to This Week in Startups on Apple: https://rb.gy/v19fcpFollow Lon:X: https://x.com/lonsFollow Alex:X: https://x.com/alexLinkedIn: https://www.linkedin.com/in/alexwilhelmFollow Jason:X: https://twitter.com/JasonLinkedIn: https://www.linkedin.com/in/jasoncalacanisThank you to our partners:(10:09) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(20:17) Northwest Registered Agent. Form your entire business identity in just 10 clicks and 10 minutes. Get more privacy, more options, and more done—visit https://www.northwestregisteredagent.com/twist today!(30:52) Bolt - Don't be left behind. Build apps quickly without knowing how to code with Bolt.new. Try it free at https://www.bolt.new/twist.Great TWIST interviews: Will Guidara, Eoghan McCabe, Steve Huffman, Brian Chesky, Bob Moesta, Aaron Levie, Sophia Amoruso, Reid Hoffman, Frank Slootman, Billy McFarlandCheck out Jason's suite of newsletters: https://substack.com/@calacanisFollow TWiST:Twitter: https://twitter.com/TWiStartupsYouTube: https://www.youtube.com/thisweekinInstagram: https://www.instagram.com/thisweekinstartupsTikTok: https://www.tiktok.com/@thisweekinstartupsSubstack: https://twistartups.substack.comSubscribe to the Founder University Podcast: https://www.youtube.com/@founderuniversity1916
David Greenwood, Product at Sekoia, joins host Charlie Osborne to discuss SOC leadership in the age of AI agents, including how they differ from traditional automation practices, best management practices, and more. This episode was brought to you by Sekoia. Leading the way in detection and response solutions for modern SOCs, Sekoia offers businesses and public organizations the best protection technologies against cyber threats. Learn more at https://sekoia.io.
Adam sits down with Taylor to discuss the importance of good product marketing, his time at Gremlin and Bridgecrew, and how his current role as a product leader at Exaforce is helping to shape the future of agentic SOC.
A importância das ferramentas em cibersegurança: custo ou investimento? Neste episódio do RedCast, os convidados discutem sobre como hoje muitos CISOs ainda se deparam com a resistência de executivos e conselhos ao falarem sobre a aquisição de ferramentas e soluções de cibersegurança. Isso acontece porque alguns tomadores de decisão ainda enxergam ferramentas de cyber como custo e não como investimento. Como CISOs podem ajudar empresas a compreenderem a importância dos investimentos em cibersegurança? E como medir o retorno sobre esse investimento? Matheus Borges e Marcos Sena, gerente de SOC da Redbelt Security, debateram o assunto com João Gilberto Passos, CISO na Brasilseg, e Ricardo Passos, gerente de segurança cibernética no will bank.
T'expliquem de viva veu els 27 Premis Roc Boronat de literatura en català. La cerimònia d’entrega del Premi Literari Roc Boronat va tenir lloc dimecres 9 d’abril a l’Auditori de l’ONCE a Barcelona, en memòria d’aquest escriptor i polític republicà, promotor del Sindicat de Cecs de Catalunya. L’acte va estar presidit per Francesc Xavier Vila, conseller de Política Lingüística de la Generalitat de Catalunya. El jurat va escollir l’autor Toni Rodríguez Piris com a guanyador per l’obra presentada amb el títol Aproximadament dos quilos i mig, una novel·la que reflexiona sobre la necessitat d’aprofitar el temps. El premi està dotat amb 6.000 €. L’obra de Toni Rodríguez Piris arribarà a les llibreries a la tardor publicada per Univers. A la categoria exclusiva per a escriptors cecs o amb discapacitat visual greu, Antonio Lozano i Rabaneda va guanyar en l’apartat de prosa amb l’obra Soc a casa, amb un premi de 900 €. Narra, amb molta ironia i com si fos una carrera d’obstacles, les dificultats per viatjar sent cec de Ripollet a Barcelona. El delegat de l’ONCE a Catalunya Enric Botí destacà el compromís de la institució amb la llengua catalana i la producció literària. Durant la vetllada, es va retre homenatge a l’escriptor Xavier Bosch. La Gran Setmana de l’ONCE a Catalunya. La Setmana del Grup Social ONCE a Catalunya, sota el lema ‘Braille, 200 anys obrint portes’, va tenir lloc del 21 al 31 de maig i es van realitzar activitats a 17 centres i agències que l'ONCE té a Catalunya. Culminà amb la celebració del Diada de la Gran Família del Grup Social ONCE a Catalunya, dissabte 31 de maig, a PortAventura. Jugadors del Terrassa FC, el tenista Tommy Robredo, els escriptors Rafel Nadal, Martí Gironell, Tània Juste, Coia Valls, el Màgic Andreu, el Conseller d’Esports,... es van posar en la pell d’una persona cega per un dia. Les activitats de la Setmana del Grup Social ONCE a Catalunya van tenir una finalitat múltiple: compartir les capacitats i habilitats de les persones amb discapacitat visual; amplificar la necessitat de disposar d'entorns, béns i productes accessibles i inclusius; visibilitzar la importància de la igualtat d'oportunitats de totes les persones, i potenciar els valors de la il·lusió, la solidaritat i sensibilitzar la ciutadania donant-li l’opció de posar-se en la pell d’una persona cega. Aquest any la gran setmana va ser també un homenatge al braille, el sistema de lectoescriptura més important per a milions de persones cegues a tot el món i que enguany celebra el seu bicentenari. Dia Internacional de Persones amb sordceguesa. El passat 27 de juny es va celebrar el Dia Internacional de les persones amb sordceguesa. Per tal de donar-li visibilitat i amb l’objectiu d’oferir una experiència sensorial única al col·lectiu, l’ONCE Catalunya organitzà, com cada any, una sortida inclusiva i accessible. Aquest any, més de 60 persones amb sordceguesa, juntament amb els seus mediadors, han realitzat una visita guiada al Park Güell. Gràcies a aquesta iniciativa, els participants es van submergir, mitjançant el tacte, en aquesta joia del Modernisme. En el cas de les persones amb sordceguesa, a Catalunya n’hi ha més de 500 afiliats a l’ONCE, el tacte és la seva manera de comunicar-se i entendre el món que els envolta. Carlos Martínez va ser un dels assistents a la visita al Park Güell i, a través de la seva mediadora Eva Maria García, ens explica l’emoció que va sentir durant la visita i la importància de comptar amb entorns adaptats, per tal que les persones amb discapacitat puguin gaudir i descobrir llocs nous en igualtat de condicions. Actes de celebració 40 aniversari CRE ONCE Barcelona: la importància de la música i les famílies. El passat dissabte 24 de maig, en el marc de la celebració dels 40 anys de la signatura del conveni entre el Departament d’Educació i l’ONCE i la inauguració del Centre de Recursos Educatius (CRE) ONCE Barcelona, va tenir lloc, a la seu de l’Escola Superior de Música de Catalunya (ESMUC), la XIX Trobada ‘Música a les Mans’, una jornada on van participar estudiants cecs o amb discapacitat visual greu d’escoles de música i conservatoris de Catalunya, Aragó i Navarra. També amb motiu del 40 aniversari del CRE, el dissabte 26 d’abril va tenir lloc la IV Jornada amb Famílies, un dia ple de sorpreses i activitats lúdiques per compartir entre alumnes, famílies i professionals. Els assistents van poder conèixer alguns dels personatges de Star Wars, ballar zumba, fer batucada, realitzar dibuixos amb textures, escriure en braille, participar en el concurs de mecanografia... https://boletinnoticiascatalunya.once.es
Segment 1: Interview with Monzy Merza - There is a Right and Wrong Way to use AI in the SOC In the rush to score AI funding dollars, a lot of startups build a basic wrapper around existing generative AI services like those offered by OpenAI and Anthropic. As a result, these services are expensive, and don't satisfy many security operations teams' privacy requirements. This is just the tip of the iceberg when discussing the challenges of using AI to aid the SOC. In this interview, we'll dive into the challenge of finding security vendors that care about security, the need for transparency in products, the evolving shared responsibility model, and other topics related to solving security operations challenges. Segment 2: Topic Segment - How much AI is too much AI? In the past few weeks, I've talked to several startup founders who are running into buyers that aren't allowed to purchase their products, even though they want them and prefer them over the competition. Why? No AI and they're not allowed to buy. Segment 3: News Segment Finally, in the enterprise security news, We cover the latest funding The Trustwave saga comes to a positive end Android 16 could help you evade law enforcement Microsoft is kicking 3rd party AV out of the kernel Giving AI some personality (and honesty) Log4shell canaries reveal password weirdness Denmark gives citizens copyright to their own faces to fight AI McDonald's has an AI whoopsie Ingram Micro has a ransomware whoopsie Drama in the trailer lock industry All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-415
Guest: Svetla Yankova, Founder and CEO, Citreno Topics: Why do so many organizations still collect logs yet don't detect threats? In other words, why is our industry spending more money than ever on SIEM tooling and still not “winning” against Tier 1 ... or even Tier 5 adversaries? What are the hardest parts about getting the right context into a SOC analyst's face when they're triaging and investigating an alert? Is it integration? SOAR playbook development? Data enrichment? All of the above? What are the organizational problems that keep organizations from getting the full benefit of the security operations tools they're buying? Top SIEM mistakes? Is it trying to migrate too fast? Is it accepting a too slow migration? In other words, where are expectations tyrannical for customers? Have they changed much since 2015? Do you expect people to write their own detections? Detecting engineering seems popular with elite clients and nobody else, what can we do? Do you think AI will change how we SOC (Tim: “SOC” is not a verb?) in the next 1- 3 -5 years? Do you think that AI SOC tech is repeating the mistakes SOAR vendors made 10 years ago? Are we making the same mistakes all over again? Are we making new mistakes? Resources: EP223 AI Addressable, Not AI Solvable: Reflections from RSA 2025 EP231 Beyond the Buzzword: Practical Detection as Code in the Enterprise EP228 SIEM in 2025: Still Hard? Reimagining Detection at Cloud Scale and with More Pipelines EP202 Beyond Tiered SOCs: Detection as Code and the Rise of Response Engineering “RSA 2025: AI's Promise vs. Security's Past — A Reality Check” blog Citreno, The Backstory “Parenting Teens With Love And Logic” book (as a management book) “Security Correlation Then and Now: A Sad Truth About SIEM” blog (the classic from 2019)
Segment 1: Interview with Monzy Merza - There is a Right and Wrong Way to use AI in the SOC In the rush to score AI funding dollars, a lot of startups build a basic wrapper around existing generative AI services like those offered by OpenAI and Anthropic. As a result, these services are expensive, and don't satisfy many security operations teams' privacy requirements. This is just the tip of the iceberg when discussing the challenges of using AI to aid the SOC. In this interview, we'll dive into the challenge of finding security vendors that care about security, the need for transparency in products, the evolving shared responsibility model, and other topics related to solving security operations challenges. Segment 2: Topic Segment - How much AI is too much AI? In the past few weeks, I've talked to several startup founders who are running into buyers that aren't allowed to purchase their products, even though they want them and prefer them over the competition. Why? No AI and they're not allowed to buy. Segment 3: News Segment Finally, in the enterprise security news, We cover the latest funding The Trustwave saga comes to a positive end Android 16 could help you evade law enforcement Microsoft is kicking 3rd party AV out of the kernel Giving AI some personality (and honesty) Log4shell canaries reveal password weirdness Denmark gives citizens copyright to their own faces to fight AI McDonald's has an AI whoopsie Ingram Micro has a ransomware whoopsie Drama in the trailer lock industry All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-415
Segment 1: Interview with Monzy Merza - There is a Right and Wrong Way to use AI in the SOC In the rush to score AI funding dollars, a lot of startups build a basic wrapper around existing generative AI services like those offered by OpenAI and Anthropic. As a result, these services are expensive, and don't satisfy many security operations teams' privacy requirements. This is just the tip of the iceberg when discussing the challenges of using AI to aid the SOC. In this interview, we'll dive into the challenge of finding security vendors that care about security, the need for transparency in products, the evolving shared responsibility model, and other topics related to solving security operations challenges. Segment 2: Topic Segment - How much AI is too much AI? In the past few weeks, I've talked to several startup founders who are running into buyers that aren't allowed to purchase their products, even though they want them and prefer them over the competition. Why? No AI and they're not allowed to buy. Segment 3: News Segment Finally, in the enterprise security news, We cover the latest funding The Trustwave saga comes to a positive end Android 16 could help you evade law enforcement Microsoft is kicking 3rd party AV out of the kernel Giving AI some personality (and honesty) Log4shell canaries reveal password weirdness Denmark gives citizens copyright to their own faces to fight AI McDonald's has an AI whoopsie Ingram Micro has a ransomware whoopsie Drama in the trailer lock industry All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-415
Ever wondered what really goes on inside a Security Operations Center (SOC)? In this episode, host, Claire Quirion chats with Derek Halfyard from GoSecure about his journey from NSCC to leading threat hunts and helping clients stay safe around the clock. We break down what a SOC is, who works there, what roles like threat hunters and detection engineers actually do, and what it's really like to build a career in cybersecurity.Derek also opens up about the biggest challenges SOC professionals face, the stress of wondering if a threat has been missed, and the unmatched satisfaction of detecting a previously unknown threat. Whether you're curious about breaking into cyber security or want to understand the realities of life inside a SOC, this episode offers deep insights and career advice. From certifications to career pivots, this is real talk for anyone curious about joining the industry.
INVITADOS: -Luis Ramírez, Ministro de Educación -Dr. Juan Manuel Invernizzi, Dir. de Gestión de Proyectos del CONES -Dr. Ernesto Weber, Soc. Pya de Pediatría y Evaluador del CONAREM -Dr. Luis María Moreno, Tribunal de Certificación de la Soc. Pya de Pediatría
On Friday's edition of WagerTalk Today, Marco D'Angelo drops by to give his favorite MLB best bets for Philadelphia Phillies vs San Diego Padres and Tokyo Brandon gives a preview of Seattle Mariners vs Detroit Tigers as well. Andrew Babakitis from the WestGate SuperBook stops by to share all the sharp action for the UFC Nashville card, including thoughts on the Main Event. Andy Lang provides props and free picks – don't miss out!Introduction 00:00Andy Steam Report 1:15Tokyo Brandon on MLB Line Moves 2:20MLB: Seattle Mariners vs Detroit Tigers Game Breakdown & Best Bet 4:20MLB: Baltimore Orioles vs Miami Marlins Live Viewer Question 7:00MLB: Texas Rangers vs Houston Astros Over/Under Total Live Viewer Question 8:10Marco D'Angelo 14:23MLB: Philadelphia Phillies vs San Diego Padres Analysis & Free Play 15:15WNBA: Atlanta Dream vs Indiana Fever Prediction & Free ATS Pick 17:55Las Vegas Aces Season Takeaways & Ways to Bet Them 20:30Andy Lang All Around the World Free Picks (MLB, SOC, WNBA & Premier Lacrosse League) 24:23Andrew Babakitis from WestGate SuperBook on UFC Nashville Sharp Action 28:33Kansas City Chiefs 2025 Season Preview & Over/Under Win Total Bets 34:45
Link to episode page This week's Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Jim Bowie, vp, CISO, Tampa General Hospital Thanks to our show sponsor, Vanta Do you know the status of your compliance controls right now? Like…right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines All links and the video of this episode can be found on CISO Series.com
Look Out! Another Outlook Outage Iranian APTs increased activity against U.S. industries in late spring Russian basketball player arrested in France over alleged ransomware ties Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines Find the stories behind the headlines at CISOseries.com.
In this expert-led session, we take you inside the world of the Security Operations Center (SOC) — the command center of modern cybersecurity. Learn how SOCs monitor, detect, and respond to threats in real time using tools like SIEM, threat intelligence, and automated response systems. We cover essential SOC functions including incident response, proactive threat hunting, and compliance alignment, while also diving into core roles such as SOC Analysts, Threat Hunters, and Incident Responders. You'll gain practical insights into SOC maturity models, workflow optimization, and how to use leading tools like Splunk, ELK, and QRadar.Perfect for aspiring SOC professionals or teams aiming to enhance their detection and response capabilities.
Tot-hom te una historia, Una que fa riure, una que fa pensar, o una que encara no s'ha explicat, A la Vida i Altres Histories obrim el micro a les veus que sovint ne s'escolten, persones que han viscut, somiat, caigut i tornat a començar, Converses reals, temes tabús, viatges, projectes, vida quotidiana i moltes coses mes La Vida i Altres Histories, el programa que escolta sense presses. Soc la Queralt Sanchez i em podrás escoltar cada divendres de 8 a 0 del vespre a Ràdio Puig-reig. T'HI APUNTES ? podcast recorded with enacast.com
AMD warns of new Meltdown, Spectre-like bugs affecting CPUs Multiple vulnerabilities in Mozilla Thunderbird could allow for arbitrary code execution Bitcoin Depot breach exposes data of nearly 27,000 crypto users, More than $40 million stolen from GMX crypto platform Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines
Dans cet épisode, Amal Madibbo, membre du CREFO, rencontre Sandra Kemzang, étudiante en droit à l'Université d'Ottawa.Sandra Kemzang est une étudiante de première année en droit à la Section de common law en français de l'Université d'Ottawa, inscrite dans le programme combiné JD-BSc.Soc avec une spécialisation en science politique. Originaire du Cameroun, elle a grandi dans une région francophone où elle a su cultiver un profond attachement à sa culture d'origine. Déjà au secondaire, elle s'était démarquée en tant que major de promotion et lauréate du Prix du leadership, une reconnaissance de son engagement exceptionnel. Aujourd'hui, elle poursuit son parcours en alliant excellence académique et implication communautaire. Représentante de sa cohorte 1L au sein du Regroupement étudiant de common law en français (RÉCLEF), mentor en chef au Centre de mentorat régional, et vice-présidente aux communications de Jeunesse Yemba — un organisme valorisant la culture camerounaise — Sandra incarne un leadership enraciné dans la culture et le service à la communauté. Elle conçoit le droit comme un levier d'équité, une manière de comprendre et de transformer les règles du jeu social pour mieux défendre les droits de chacun. Par son travail au RÉCLEF, elle milite pour un meilleur accès à la justice en français et souhaite contribuer à renforcer l'offre de services juridiques dans les deux langues officielles. Engagée, rigoureuse et profondément ancrée dans ses valeurs, elle œuvre aussi à rendre la profession juridique plus inclusive en encourageant les jeunes femmes noires et les étudiants francophones à poursuivre des études en droit. Résolument tournée vers l'avenir, Sandra Kemzang représente une voix forte pour un droit plus juste, plus accessible et plus représentatif de la diversité canadienne.
Send us a textIn this thoughtful and grounded conversation recorded at Pax8 Beyond 2025, Joey Pinz sits down with Chance Weaver, a seasoned MSP veteran and executive at High Wire Networks, to unpack the intersection of growth, wellness, and sustainable leadership in tech.Chance shares his personal journey through multiple acquisitions, the burnout that followed, and how introspection and intentionality helped him realign with what really matters. They talk openly about the toll that tech leadership can take — especially in the fast-paced world of MSPs — and how High Wire's growth strategy aims to be bold without breaking people.This episode also explores the High Wire partner model, how they scale complex cybersecurity services like SOC-as-a-Service, and the importance of enabling MSPs to lead with their brand, not the vendor's. Chance emphasizes that the secret isn't more tools — it's more clarity.If you're running an MSP or leading a tech team, this episode will resonate. It's about listening to yourself, empowering your partners, and knowing when it's time to let go — or gear up again.
Send us a textIn this wide-ranging episode of Joey Pinz Discipline Conversations, cybersecurity leader Joe Saunders of Check Point shares his journey—from Cuban cigars to global IT strategy. Recorded live at Pax8 Beyond 2025, this conversation blends personal passions with serious insights on cybersecurity, leadership, and AI.Joe kicks things off with a deep appreciation for cigars, explaining how a Cuban cigar gifted at a Pax8 event sparked his fascination. From flavor profiles to Connecticut Maduro wrappers, Joe uses the cigar world as a metaphor for personalization and nuance—something he also values in business relationships.The conversation shifts to Check Point's major Infinity Platform launch, a consolidated suite of AI-powered security tools designed to better serve MSPs and SMBs. Joe highlights the importance of MSP-focused features like multi-tenancy, API integrations, and compliance frameworks (SOC, ISO), all tailored for modern partner operations.He also reflects on the role of discipline and self-awareness in his own growth, echoing Joey's own health journey. Joe closes by inviting MSPs to visit the Check Point booth, try the platform with free licenses, and embrace AI-driven security innovation.
Before a power crew rolls out to check a transformer, sensors on the grid have often already flagged the problem. Before your smart dishwasher starts its cycle, it might wait for off-peak energy rates. And in the world of autonomous vehicles, lightweight systems constantly scan road conditions before a decision ever reaches the car's central processor.These aren't the heroes of their respective systems. They're the scouts, the context-builders: automated agents that make the entire operation more efficient, timely, and scalable.Cybersecurity is beginning to follow the same path.In an era of relentless digital noise and limited human capacity, AI agents are being deployed to look first, think fast, and flag what matters before security teams ever engage. But these aren't the cartoonish “AI firefighters” some might suggest. They're logical engines operating at scale: pruning data, enriching signals, simulating outcomes, and preparing workflows with precision."AI agents are redefining how security teams operate, especially when time and talent are limited," says Kumar Saurabh, CEO of AirMDR. "These agents do more than filter noise. They interpret signals, build context, and prepare response actions before a human ever gets involved."This shift from reactive firefighting to proactive triage is happening across cybersecurity domains. In detection, AI agents monitor user behavior and flag anomalies in real time, often initiating mitigation actions like isolating compromised devices before escalation is needed. In prevention, they simulate attacker behaviors and pressure-test systems, flagging unseen vulnerabilities and attack paths. In response, they compile investigation-ready case files that allow human analysts to jump straight into action."Low-latency, on-device AI agents can operate closer to the data source, better enabling anomaly detection, threat triaging, and mitigation in milliseconds," explains Shomron Jacob, Head of Applied Machine Learning and Platform at Iterate.ai. "This not only accelerates response but also frees up human analysts to focus on complex, high-impact investigations."Fred Wilmot, Co-Founder and CEO of Detecteam, points out that agentic systems are advancing limited expertise by amplifying professionals in multiple ways. "Large foundation models are driving faster response, greater context and more continuous optimization in places like SOC process and tools, threat hunting, detection engineering and threat intelligence operationalization," Wilmot explains. "We're seeing the dawn of a new way to understand data, behavior and process, while optimizing how we ask the question efficiently, confirm the answer is correct and improve the next answer from the data interaction our agents just had."Still, real-world challenges persist. Costs for tokens and computing power can quickly outstrip the immediate benefit of agentic approaches at scale. Organizations leaning on smaller, customized models may see greater returns but must invest in AI engineering practices to truly realize this advantage. "Companies have to get comfortable with the time and energy required to produce incremental gains," Wilmot adds, "but the incentive to innovate from zero to one in minutes should outweigh the cost of standing still."Analysts at Forrester have noted that while the buzz around so-called agentic AI is real, these systems are only as effective as the context and guardrails they operate within. The power of agentic systems lies in how well they stay grounded in real data, well-defined scopes, and human oversight. ¹ ²While approaches differ, the business case is clear. AI agents can reduce toil, speed up analysis, and extend the reach of small teams. As Saurabh observes, AI agents that handle triage and enrichment in minutes can significantly reduce investigation times and allow analysts to focus on the incidents that truly require human judgment.As organizations wrestle with a growing attack surface and shrinking response windows, the real value of AI agents might not lie in what they replace, but in what they prepare. Rob Allen, Chief Product Officer at ThreatLocker, points out, "AI can help you detect faster. But Zero Trust stops malware before it ever runs. It's not about guessing smarter; it's about not having to guess at all." While AI speeds detection and response, attackers are also using AI to evade defenses, making it vital to pair smart automation with architectures that deny threats by default and only allow what's explicitly needed.These agents are the eyes ahead, the hands that set the table, and increasingly the reason why the real work can begin faster and smarter than ever before.References1. Forrester. (2024, February 8). Cybersecurity's latest buzzword has arrived: What agentic AI is — and isn't. Forrester Blogs. https://www.forrester.com/blogs/cybersecuritys-latest-buzzword-has-arrived-what-agentic-ai-is-and-isnt/ (cc: Allie Mellen and Rowan Curran)2. Forrester. (2024, March 13). The battle for grounding has begun. Forrester Blogs. https://www.forrester.com/blogs/the-battle-for-grounding-has-begun/ (cc: Ted Schadler)________This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is a life-long musician and the host of the Music Evolves Podcast; a career technologist, cybersecurity professional, and host of the Redefining CyberSecurity Podcast; and is also the co-host of both the Random and Unscripted Podcast and On Location Event Coverage Podcast. These shows are all part of ITSPmagazine—which he co-founded with his good friend Marco Ciappelli, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️Want to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: https://www.itspmagazine.com/on-locationTo learn more about Sean, visit his personal website.
Four members of President Trump's cabinet impersonated Is this some kind of a game? Batavia attacks Russian industrial companies Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines
Before a power crew rolls out to check a transformer, sensors on the grid have often already flagged the problem. Before your smart dishwasher starts its cycle, it might wait for off-peak energy rates. And in the world of autonomous vehicles, lightweight systems constantly scan road conditions before a decision ever reaches the car's central processor.These aren't the heroes of their respective systems. They're the scouts, the context-builders: automated agents that make the entire operation more efficient, timely, and scalable.Cybersecurity is beginning to follow the same path.In an era of relentless digital noise and limited human capacity, AI agents are being deployed to look first, think fast, and flag what matters before security teams ever engage. But these aren't the cartoonish “AI firefighters” some might suggest. They're logical engines operating at scale: pruning data, enriching signals, simulating outcomes, and preparing workflows with precision."AI agents are redefining how security teams operate, especially when time and talent are limited," says Kumar Saurabh, CEO of AirMDR. "These agents do more than filter noise. They interpret signals, build context, and prepare response actions before a human ever gets involved."This shift from reactive firefighting to proactive triage is happening across cybersecurity domains. In detection, AI agents monitor user behavior and flag anomalies in real time, often initiating mitigation actions like isolating compromised devices before escalation is needed. In prevention, they simulate attacker behaviors and pressure-test systems, flagging unseen vulnerabilities and attack paths. In response, they compile investigation-ready case files that allow human analysts to jump straight into action."Low-latency, on-device AI agents can operate closer to the data source, better enabling anomaly detection, threat triaging, and mitigation in milliseconds," explains Shomron Jacob, Head of Applied Machine Learning and Platform at Iterate.ai. "This not only accelerates response but also frees up human analysts to focus on complex, high-impact investigations."Fred Wilmot, Co-Founder and CEO of Detecteam, points out that agentic systems are advancing limited expertise by amplifying professionals in multiple ways. "Large foundation models are driving faster response, greater context and more continuous optimization in places like SOC process and tools, threat hunting, detection engineering and threat intelligence operationalization," Wilmot explains. "We're seeing the dawn of a new way to understand data, behavior and process, while optimizing how we ask the question efficiently, confirm the answer is correct and improve the next answer from the data interaction our agents just had."Still, real-world challenges persist. Costs for tokens and computing power can quickly outstrip the immediate benefit of agentic approaches at scale. Organizations leaning on smaller, customized models may see greater returns but must invest in AI engineering practices to truly realize this advantage. "Companies have to get comfortable with the time and energy required to produce incremental gains," Wilmot adds, "but the incentive to innovate from zero to one in minutes should outweigh the cost of standing still."Analysts at Forrester have noted that while the buzz around so-called agentic AI is real, these systems are only as effective as the context and guardrails they operate within. The power of agentic systems lies in how well they stay grounded in real data, well-defined scopes, and human oversight. ¹ ²While approaches differ, the business case is clear. AI agents can reduce toil, speed up analysis, and extend the reach of small teams. As Saurabh observes, AI agents that handle triage and enrichment in minutes can significantly reduce investigation times and allow analysts to focus on the incidents that truly require human judgment.As organizations wrestle with a growing attack surface and shrinking response windows, the real value of AI agents might not lie in what they replace, but in what they prepare. Rob Allen, Chief Product Officer at ThreatLocker, points out, "AI can help you detect faster. But Zero Trust stops malware before it ever runs. It's not about guessing smarter; it's about not having to guess at all." While AI speeds detection and response, attackers are also using AI to evade defenses, making it vital to pair smart automation with architectures that deny threats by default and only allow what's explicitly needed.These agents are the eyes ahead, the hands that set the table, and increasingly the reason why the real work can begin faster and smarter than ever before.References1. Forrester. (2024, February 8). Cybersecurity's latest buzzword has arrived: What agentic AI is — and isn't. Forrester Blogs. https://www.forrester.com/blogs/cybersecuritys-latest-buzzword-has-arrived-what-agentic-ai-is-and-isnt/ (cc: Allie Mellen and Rowan Curran)2. Forrester. (2024, March 13). The battle for grounding has begun. Forrester Blogs. https://www.forrester.com/blogs/the-battle-for-grounding-has-begun/ (cc: Ted Schadler)________This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is a life-long musician and the host of the Music Evolves Podcast; a career technologist, cybersecurity professional, and host of the Redefining CyberSecurity Podcast; and is also the co-host of both the Random and Unscripted Podcast and On Location Event Coverage Podcast. These shows are all part of ITSPmagazine—which he co-founded with his good friend Marco Ciappelli, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️Want to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: https://www.itspmagazine.com/on-locationTo learn more about Sean, visit his personal website.
All links and images can be found on CISO Series. This week's episode is hosted by me, David Spark, producer of CISO Series and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is Anthony Candeias, CISO, Weight Watchers. In this episode: AI agents require structured supervision, not autonomy Hiring for potential over credentials in cybersecurity AppSec training effectiveness depends on organizational relevance AI oversight requires purpose-built models, not general solutions A huge thanks to our sponsor, Vanta Vanta's Trust Management Platform helps 10k+ companies—like Atlassian, Quora, and Chili Piper—start and scale their security programs and build trust with buyers. Vanta saves security teams time and improves program visibility by automating 35+ compliance frameworks, such as SOC 2 and ISO 27001, and GRC workflows, like risk management. Get started at Vanta.com/CISO
Call of Duty game pulled from PC store after reported exploit U.S. military gets cybersecurity boost Bank employee helped hackers steal $100M Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines
Ingram Micro suffers ransomware attack Hacker leaks Telefónica data allegedly from new breach ChatGPT prone to recommending wrong URLs, creating a new phishing opportunity Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines Find the stories behind the headlines at CISOseries.com.
Recreating the natural hearing experience has long challenged researchers who study auditory perception. Recently, ambisonic panning has been developed as a method to accurately reproduce soundscapes. In this episode, we talk with Nima Zargarnezhad and Ingrid Johnsrude (Western University) about their research testing the accuracy of the "AudioDome," a device that using ambisonic panning to simulate soundscapes in the lab.Associated paper:- Nima Zargarnezhad, Bruno Mesquita, Ewan A Macpherson. and Ingrid Johnsrude. "Focality of sound source placement by higher (ninth) order ambisonics and perceptual effects of spectral reproduction errors." J. Acoust. Soc. Am. 157, 2802–2818 (2025). https://doi.org/10.1121/10.0036226.Read more from The Journal of the Acoustical Society of America (JASA).Learn more about Acoustical Society of America Publications.Music Credit: Min 2019 by minwbu from Pixabay.
In this episode of the CPQ Podcast, we're joined by Nikhil Muralitharan, Senior Director of Product Marketing at Chargebee, to explore how modern CPQ solutions are evolving for software and digital service businesses. Nikhil shares his unique journey from software engineering to product marketing leadership—and how his career path mirrors his personal theme of "connecting the dots." We dive deep into Chargebee's API-first, modular CPQ platform, built to support hybrid sales motions like PLG and sales-assisted selling—without maintaining separate catalogs or tech stacks. With customers ranging from $3M to $150M in revenue across the UK, Europe, ANZ, and North America, Chargebee offers out-of-the-box integrations with Salesforce, HubSpot, NetSuite, Sage Intacct, and over 60 other systems. Nikhil also discusses: Their AI-generated quote summaries and vision for CPQ in an AI-native world Why sales and finance teams should operate from a shared data foundation Chargebee's approach to billing-first CPQ architecture, SOC 1/SOC 2 and ISO 27001 compliance A new guided selling experience launching later this year Their 6-stage implementation methodology and fast go-live timelines If you're looking for a CPQ solution designed for digital growth, flexible pricing models, and enterprise-grade compliance—this episode is a must-listen.
Ekco, one of Europe's leading security-first managed service providers, has announced that it has acquired Adapt IT, a Cork-headquartered IT managed service provider (MSP). The new deal, which is Ekco's sixth acquisition in two years, brings Ekco's total acquisition investment to €57 million within this timeframe. In business for more than 20 years, Adapt IT employs 37 people at its Cork location, serving customers in the small-and-medium-sized enterprises (SME) market. Its 300-strong customer base operates in industries such as manufacturing, retail, hospitality, legal, and finance. The deal bolsters Ekco's ability to support fast-growing SMEs with unified, secure, and scalable technology solutions. The acquisition of Adapt IT brings Ekco's global headcount to more than 1,000 employees and adds a seventh Irish location to its growing regional network. In addition to its three sites in Dublin, Ekco now operates in Cork, Waterford, and Laois, as well as across the UK, Netherlands, South Africa, and Malaysia. Adapt IT's expertise in Microsoft solutions will strengthen Ekco's modern working service offering for its customers, and its MSP focus will further build upon Ekco's existing managed service capabilities. Adapt IT's customer base will now benefit from Ekco's suite of advanced cloud services, automation expertise, and cybersecurity capabilities in areas including security information and event management (SIEM), security operations centres (SOC), and backup. As the cybersecurity regulatory landscape continues to evolve, Ekco will also provide peace of mind through its compliance services. Additionally, Adapt IT's teams will be able to avail of comprehensive upskilling, certification, and continuous learning opportunities to keep pace with industry demand. The deal is the latest in Ekco's wider acquisition strategy for growth and brings the total number of businesses acquired by Ekco in the last two years to six. Earlier this year, the company announced the purchase of Predatech, a UK-based cybersecurity consultancy. In 2024, it added UK legal IT specialist CTS to its portfolio of companies. 2023 saw the additions of MSPs Radius and Bluecube, as well as cloud migration and cybersecurity specialist iSystems. Cian Prendergast, CEO at Ekco MSP, said: "The acquisition of Adapt IT is the latest move in our aggressive expansion strategy which targets key acquisitions combined with sustained business growth. This strategy reflects an investment in innovation that will make us in Ekco, and our acquired companies, stronger as a result. We're building a modern, security-first MSP that helps ambitious businesses to operate with confidence and resilience. "Adapt IT, like us, is a cloud-first business that reflects our culture and has had tremendous success in building a nationwide customer base. By bringing our two companies together, we will enhance our regional footprint in a location where we see vast opportunities for our expansion, while also combining our knowledge and services to pioneer the demands of the modern enterprise. It strengthens our position as the go-to IT partner for businesses who want the reliability of a national partner with the responsiveness of a local team." John Levis, Managing Director, Adapt IT, said: "We are delighted to join the Ekco group, an Irish-founded business which is on an impressive growth trajectory. This will enable us to continue to deliver top-tier services to businesses, backed up by the skills and resources of a larger group. We are seeing that even smaller businesses are seeking enterprise-grade IT and cybersecurity solutions - Ekco's expertise will help us to meet this growing demand as the volume and complexity of cyber threats continues to rise." See more stories here.
Last week the SOC hosted So You Want To Be An A Camera Operator (hint it's more than just panning and tilting) at the Chapman facilities in Atlanta. Operators Matt Petrosky, Chris Duskin, Jessica Hershatter, Greg Faysash, Brigman "Briggs" Foster-Owens, Dave Chameides and Dolly Grip Eric Zucker discuss the 95% of the job of being a camera operator that has nothing to do with with operating itself. Interpersonal skills, working with a new dolly grip, when the director and the DP aren't agreeing on things, we discuss the part of the job that is not always as easy to learn as landing a frame. To see pictures and things we discussed in todays episode check out the podcast page of The Op. Please check us out on the web and instagram and like us and review us if you enjoyed the episode. Theme Music - Tatyana Richaud Theme Mix - Charles Papert
Kui Jia, Sumo Logic's Vice President of Engineering and Head of AI, shares how their AWS-powered AI agents transform chaotic security investigations into streamlined workflows.Topics Include:Kui Jia leads AI Engineering at Sumo LogicSREs and SOC analysts work under chaotic, high-pressure conditionsTeams constantly switch between different vendor tools and platformsInvestigation requires quick hypothesis formation and complex query writingSumo Logic processes petabytes of data daily across enterprisesCompany serves 2,000+ enterprise customers for 15 yearsPlatform focuses on observability and cybersecurity use casesInvestigation journey: discover, diagnose, decide, act, learn phasesData flows from ingestion through analytics to human insightsTraditional workflow relies heavily on tribal domain knowledgeSenior engineers create queries that juniors struggle to understandWar room situations demand immediate answers, not learning curvesContext switching between tools wastes time and creates frictionMultiple AI generations deployed: ML anomaly detection to GenAIAgentic AI enables reasoning, planning, tools, and evaluation capabilitiesMo Copilot launched at AWS re:Invent as AI agent suiteNatural language converts high-level questions into Sumo queriesSystem provides intelligent autocomplete and multi-turn conversationsInsight agents summarize logs and security signals automaticallyKnowledge integration combines foundation models with proprietary metadataAI generates playbooks and remediation scripts for automated actionsThree-tier architecture: Infrastructure, AI Tooling, and Application layersBuilt on AWS Bedrock with Nova models for performanceFocus on reusable infrastructure and AI tooling componentsData differentiation more important than AI model selectionGolden datasets and contextualized metadata are development challengesGuardrails and evaluation frameworks critical for enterprise deploymentAI observability enables debugging and performance monitoringEnterprise agents achievable within one year development timelineFuture vision: multiple AI agents collaborating with human investigatorsParticipants:Kui Jia – Vice President of AI Engineering, Head of AI, Sumo LogicFurther Links:Website: https://www.sumologic.com/Sumo Logic in the AWS MarketplaceSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon.com/isv/
Welcome to Reimagining Cyber! In this episode, Tyler Moffitt (Senior Security Strategist, OpenText) , dissects one of the hottest—and most misunderstood—topics in tech: the AI bubble in cybersecurity. Is AI revolutionizing threat detection and response, or are we falling for another overhyped tech trend? Tyler draws parallels to the blockchain frenzy of 2017, warning of “AI-washing,” overblown marketing claims, and venture capital-fueled hype that may be outpacing real-world results.The conversation dives into where AI is genuinely making an impact—like anomaly detection, threat intel summarization, and SOC automation—and where it's still falling short, from false positives and model drift to the black-box problem. With signs of a bubble already forming, including vendor consolidation and flashy tools that don't deliver, Tyler urges security leaders to focus on co-pilot approaches, not full automation. Bottom line? AI can be a force multiplier, but only when paired with human expertise and solid cyber hygiene.Whether you're skeptical of the buzz or curious about where AI in cybersecurity is actually working, this episode brings a grounded, no-fluff take on the state of the industry.Key Topics:Signs we're in an AI bubbleAI's real impact areas vs. marketing fluffWhy human-in-the-loop still mattersRisks of overreliance and analyst de-skillingWhat smart AI adoption looks like for security leadersTune in to cut through the noise and get real about AI in cyber.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70 Chief Information Security Officer CISO Podcasts rankings.
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining us is Anne Marie Zettlemoyer, former vp of security, Activision Blizzard. In this episode SOC automation: Moving beyond alert fatigue The entry-level security talent reality Learning from security incidents without blame Evaluating security vendor viability and partnerships A huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.
On this episode of Gov Tech Today, hosts Russell Lowery and Jennifer Saha dive into the California Department of Technology's (CDT) new Security Operations Center (SOC) as a service offering. They discuss how this centralized security operation aims to support state departments and local agencies with 24/7 monitoring and threat detection. The conversation explores the competitive landscape for SOC services, the potential role of AI in cybersecurity, and the importance of inter-departmental collaboration. Special mention is made of how this initiative can enhance the state's overall cybersecurity framework while offering new opportunities for the vendor community. 00:00 Introduction to Govtech Today00:14 Centralized Security Operations in Nevada00:27 CDT's SOC as a Service00:57 Benefits of a Centralized SOC01:25 CDT's Approach to Service Offering02:13 Details of CDT's SOC Services04:26 Vendor Community Considerations06:51 Comparing CDT and Private Sector Offerings12:25 AI in Security Operations13:17 Federated Model and Data Sharing15:47 Statewide Contract and Purchasing Power16:46 Cybersecurity Maturity and Compliance17:49 Conclusion and Final Thoughts
Drawing from his experience building enterprise SOCs and teaching thousands of security professionals, John Hubbard, Cyber Defense Curriculum Lead at SANS Institute and host of the Blueprint podcast, tells Jack about how AI is revolutionizing security operations centers, including balancing AI automation with fundamental analyst skills. They also explore practical AI applications in alert contextualization, team performance analysis, and the future vision of natural language interfaces for complex security tasks. John emphasizes the importance of teaching both traditional methods and AI-enhanced approaches, ensuring security teams can leverage technology while maintaining critical thinking capabilities. He also discusses considerations around local versus cloud-based AI models and offers actionable advice for security professionals looking to future-proof their careers in an increasingly automated landscape. Topics discussed: How AI transforms alert contextualization by dynamically incorporating business context and asset information for better triage decisions. The educational challenge of teaching both foundational security methods and AI-enhanced approaches to maintain analyst skills. Practical applications of AI in SOC operations, including automated phishing triage and mass analysis of analyst performance data. The evolution toward natural language interfaces that could enable complex security tasks like packet analysis through conversational commands. Custom agent development versus relying on vendor-provided AI solutions, including the technical challenges and coding requirements involved. Future SOC architecture predictions featuring interconnected agents, MCP protocols, and the abstraction of traditional security analyst tasks. Local versus cloud-based AI model considerations, including data privacy concerns, computational requirements, and trust implications. The critical question of oversight in automated security operations and who monitors AI agents in increasingly autonomous systems. Performance analysis capabilities enabled by AI's ability to process written text and logs at scale for team improvement insights. Practical advice for security professionals to embrace discomfort, invite AI into problem-solving, and establish mentoring relationships for career growth. Listen to more episodes: Apple Spotify YouTube Website
Today's show: Jason sits down with Balaji Srinivasan in Singapore to explore how he's turning years of theory into reality with Network School—the first node of a broader vision for internet-native, decentralized societies. Balaji explains how these “sharp societies” combine education, co-living, and startup culture to create physical communities aligned by values, not geography. From digital nomads to aspiring founders, people are opting into these new systems as an alternative to broken traditional governance. They discuss everything from Starbase and sovereignty to the future of democracy, Bitcoin, and America's place in a multipolar world.Timestamps:(0:00) Introduction of Balaji Srinivasan and the impact of Bitcoin(1:39) The concept of Network School and Network State, including startup societies(4:05) Benefits and historical context of network effects in communities(7:08) Economic and social benefits of Network School(9:35) Global appeal and diverse motivations of Network School participants(10:22) Squarespace - Use offer code TWIST to save 10% off your first purchase of a website or domain at https://www.Squarespace.com/TWIST(12:30) Media perspectives on new societies and the challenge of self-determination(19:35) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(24:00) Personal experiences with US state migration and critique of California politics(27:11) The right to exit, thousand city system, and the two-party system(29:44) Vouched - Trust for agents that's built for builders like you. Check it out at http://vouched.id/twist(31:09) Choosing a country like choosing a college and impressions of new cities(34:03) America's global reputation, politics, and the decline of empires(39:25) Dollar devaluation, Bitcoin's future, and global currency dynamics(41:26) Global power struggles: China versus the Internet and US demographics(44:01) Trump's tariffs, MAGA, and international trade realities(48:12) China's manufacturing dominance and US diplomatic legacy(54:39) The Internet's counterbalance to China and Bitcoin's future risks(1:00:31) Role of cryptocurrencies, quantum computing, and Bitcoin security(1:02:12) Cryptocurrency challenges and the resilience of Bitcoin(1:03:27) Network school state community and opportunities for investors(1:04:01) Closing remarks and final pitch for Network SchoolSubscribe to the TWiST500 newsletter: https://ticker.thisweekinstartups.comCheck out the TWIST500: https://www.twist500.comSubscribe to This Week in Startups on Apple: https://rb.gy/v19fcpFollow Lon:X: https://x.com/lonsFollow Alex:X: https://x.com/alexLinkedIn: https://www.linkedin.com/in/alexwilhelmFollow Jason:X: https://twitter.com/JasonLinkedIn: https://www.linkedin.com/in/jasoncalacanisThank you to our partners:(10:22) Squarespace - Use offer code TWIST to save 10% off your first purchase of a website or domain at https://www.Squarespace.com/TWIST(19:35) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(29:44) Vouched - Trust for agents that's built for builders like you. Check it out at http://vouched.id/twist(0:00)Great TWIST interviews: Will Guidara, Eoghan McCabe, Steve Huffman, Brian Chesky, Bob Moesta, Aaron Levie, Sophia Amoruso, Reid Hoffman, Frank Slootman, Billy McFarlandCheck out Jason's suite of newsletters: https://substack.com/@calacanisFollow TWiST:Twitter: https://twitter.com/TWiStartupsYouTube: https://www.youtube.com/thisweekinInstagram: https://www.instagram.com/thisweekinstartupsTikTok: https://www.tiktok.com/@thisweekinstartupsSubstack: https://twistartups.substack.comSubscribe to the Founder University Podcast: https://www.youtube.com/@founderuniversity1916
Wilson Patton, Solutions Architect for Trellix, demonstrates how their four-pillar Gen-AI framework transforms incident alerts into actionable intelligence.Topics Include:Wilson Patton: Trellix Solutions Architect, 20 years government experienceWitnessed evolution from basic firewalls to zero trust architecturesTrellix combines McAfee and FireEye heritage and capabilitiesAI integration isn't new - machine learning embedded for yearsPartnership with AWS Bedrock accelerates Gen-AI development capabilities2014: Developed Impossible Travel Analytic for anomaly detection2016: Launched Guided Investigations framework for SOC analysts2023: Introduced AI Guided Investigations with contextual understanding64% of public sector exploring AI adoption activelyOnly 21% have requisite data ready for trainingGen-AI won't magically clean up messy, siloed data74% of executives doubt AI information accuracy currentlyMonday morning alert queue: 76 high, 318 medium alertsAdversaries steal credentials 90 days before major incidentsCritical breadcrumbs hidden in low-priority informational alerts1000+ data-driven investigative questions developed over eight yearsSkilled analysts take too long reading all answersAutomate analysis, distill thousands down to ten critical alertsFour foundational pillars for effective, trustworthy Gen-AI implementationCybersecurity expertise essential - Gen-AI is just a toolFrameworks ensure reliability and consistent prompting for productionMultiple LLM models tested through AWS Bedrock platformQuality diverse datasets required for accurate question answeringGood prompts combine evidence, context, and comprehensive informationTesting shows order of magnitude price differences between modelsNova Micro provides cost-effective results for many scenariosPrompt engineering superior to fine-tuning for avoiding biasAgentic AI performs multi-step investigations with live dataStrategic model choice based on specific requirements and costsTransparent audit trails mandatory for government compliance requirements Participants:Wilson Patton – Solutions Architect, TrellixFurther Links:Website: https://www.trellix.comTrellix in the AWS MarketplaceSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon.com/isv/
In this episode, Stephanie Boyles-Griffin, Jessica Tegt, Steve Demarais, and Bronson Strickland discuss the complexities of urban deer management, exploring the challenges posed by growing deer populations in urban areas. While recreational hunting remains the most effective and practical tool for population control in most settings, an increasing number of circumstances—especially in urban and suburban areas—render it unfeasible. Stephanie and Jessica, both from the Botstiber Institute, outline non-lethal and alternative methods commonly used to manage deer in these environments and walk through the series of decisions required to evaluate which techniques are appropriate and how likely they are to succeed. Below, Stephanie and Jessica have provided resources if you are interested in learning more. Check out the MSU Deer Lab's online seminar series (here) and choose the Natural Resources option from the Categories drop down menu. You will have to create an account to view the seminars. The seminars are free unless you are seeking professional educational credits. Also, be sure to visit our YouTube channel (here) Stephanie Boyles-Griffin: boylesgriffinadvisor@botstiber.org Jessica Tegt: jtegt@botstiber.org Urban Deer Conflict Management Planning Resources https://www.humaneworld.org/sites/default/files/docs/HSUS%20Deer%20Conflict%20Mgt%20Plan_FINAL.pdf https://ecommons.cornell.edu/server/api/core/bitstreams/b297ac45-d908-4fd9-b06f-95cd5376907d/content https://www.fishwildlife.org/application/files/8816/1297/6730/Methods_for_Managing_Human-Deer_Conflicts_in_Urban_Suburban_and_Exurban_Areas.pdf BIWFC https://wildlifefertilitycontrol.org/ https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1871&context=hwi https://wildlifefertilitycontrol.org/webinars/webinar-surgical-solutions-innovations-in-nonlethal-deer-management/ https://wildlifefertilitycontrol.org/webinar-11-blacktail-deer/ https://wildlifefertilitycontrol.org/webinar-denicola/ Surgical https://www.whitebuffaloinc.org/ DeNicola, A. J., and V. L. DeNicola. 2021. Ovariectomy as a management technique for suburban deer populations. Wildlife Society Bulletin 45:445–455 Staten Island Story Map https://storymaps.arcgis.com/stories/e3a5f6d544594690a313693d1e88d9ef DeNicola, V., Mezzini, S., Bursać, P. et al. Effects of vasectomy on breeding-related movement and activity in free-ranging white-tailed deer. Mov Ecol 13, 34 (2025) Nonsurgical Naugle, R. E., A. T. Rutberg, H. B. Underwood, J. W. Turner, Jr., and I. K. M. Liu. 2002. Field testing of immunocontraception on white-tailed deer (Odocoileus virginianus) at Fire Island National Seashore, New York, USA. Reproduction Supplement 60:143–153. Rutberg, A. T., R. E. Naugle, L. A. Thiele, and I. K. M. Liu. 2004. Effects of immunocontraception on a suburban population of white-tailed deer Odocoileus virginianus. Biological Conservation 116:243–250. Gionfriddo. J. P., A. J. DeNicola, L. Miller, and K. A. Fagerstone. 2011. Efficacy of GnRH immunocontraception of wild white-tailed deer in New Jersey. Wildlife Society Bulletin 35(3):149–160. Rutberg, A. T., R. E. Naugle, J. W. Turner, Jr., M. Fraker, D. Flanagan, and I. K. M. Liu. 2013. Tests of one-treatment immunocontraceptive vaccines on white-tailed deer (Odocoileus virginianus) on Fripp Island, SC. Wildlife Research 40:281–288. Walker, M.J., Shank, G.C., Stoskopf, M.K., Minter, L.J. and DePerno, C.S. (2021), Efficacy and Cost of GonaCon™ for Population Control in a Free-ranging White-tailed Deer Population. Wildl. Soc. Bull., 45: 589-596
Click here to send us your ideas and feedback on Blueprint!This podcast episode is from the SANS Cyber Leaders Podcast.The episode features Blueprint host John Hubbard, where he talks with hosts James Lyne and Ciaran Martin on the ever-changing threat landscape and how SOC teams can stay ahead. John shares his expertise on spotting threats early, how to test your defences before the real attackers show up, and why he's on a mission to simplify cybersecurity operations for the next generation of defenders.Check out John's SOC Training Courses for SOC Analysts and Leaders: SEC450: Blue Team Fundamentals - Security Operations and Analysis LDR551: Building and Leader Security Operations Centers Follow and Connect with John: LinkedIn
Dr. Diwakar Davar and Dr. Jason Luke discuss novel agents in melanoma and other promising new data in the field of immunotherapy that were presented at the 2025 ASCO Annual Meeting. TRANSCRIPT Dr. Diwakar Davar: Hello. My name is Diwakar Davar, and I am welcoming you to the ASCO Daily News Podcast. I'm an associate professor of medicine and the clinical director of the Melanoma and Skin Cancer Program at the University of Pittsburgh's Hillman Cancer Center. Today, I'm joined by my colleague and good friend, Dr. Jason Luke. Dr. Luke is a professor of medicine. He is also the associate director of clinical research and the director of the Phase 1 IDDC Program at the University of Pittsburgh's Hillman Cancer Center. He and I are going to be discussing some key advancements in melanoma and skin cancers that were presented at the 2025 ASCO Annual Meeting. Our full disclosures are available in the transcript of this episode. Jason, it is great to have you back on the podcast. Dr. Jason Luke: Thanks again so much for the opportunity, and I'm really looking forward to it. Dr. Diwakar Davar: Perfect. So we will go ahead and start talking a little bit about a couple of key abstracts in both the drug development immunotherapy space and the melanoma space. The first couple of abstracts, the first two, will cover melanoma. So, the first is LBA9500, which was essentially the primary results of RELATIVITY-098. RELATIVITY-098 was a phase 3 trial that compared nivolumab plus relatlimab in a fixed-dose combination against nivolumab alone for the adjuvant treatment of resected high-risk disease. Jason, do you want to maybe give us a brief context of what this is? Dr. Jason Luke: Yeah, it's great, thanks. So as almost all listeners, of course, will be aware, the use of anti–PD-1 immunotherapies really revolutionized melanoma oncology over the last 10 to 15 years. And it has become a standard of care in the adjuvant setting as well. But to review, in patients with stage III melanoma, treatment can be targeted towards BRAF with BRAF and MEK combination therapy, where that's relevant, or anti–PD-1 with nivolumab or pembrolizumab are a standard of care. And more recently, we've had the development of neoadjuvant approaches for palpable stage III disease. And in that space, if patients present, based on two different studies, either pembrolizumab or nivolumab plus ipilimumab can be given prior to surgery for somewhere in the 6- to 9-week range. And so all of these therapies have improved time-to-event endpoints, such as relapse-free or event-free survival. It's worth noting, however, that despite those advances, we've had a couple different trials now that have actually failed in this adjuvant setting, most high profile being the CheckMate-915 study, which looked at nivolumab plus ipilimumab and unfortunately was a negative study. So, with RELATIVITY-047, which was the trial of nivolumab plus relatlimab that showed an improvement in progression-free survival for metastatic disease, there's a lot of interest, and we've been awaiting these data for a long time for RELATIVITY-098, which, of course, is this adjuvant trial of LAG-3 blockade with relatlimab plus nivolumab. Dr. Diwakar Davar: Great. So with that, let's briefly discuss the trial design and the results. So this was a randomized, phase 3, blinded study, so double-blinded, so neither the investigators knew what the patients were getting, nor did the patients know what they were getting. The treatment investigational arm was nivolumab plus relatlimab in the fixed-dose combination. So that's the nivolumab standard fixed dose with relatlimab that was FDA approved in RELATIVITY-047. And the control arm was nivolumab by itself. The duration of treatment was 1 year. The patient population consisted of resected high-risk stage III or IV patients. The primary endpoint was investigator-assessed RFS. Stage and geography were the standard stratifying factors, and they were included, and most of the criteria were balanced across both arms. What we know at this point is that the 2-year RFS rate was 64% and 62% in the nivolumab and nivolumab-combination arms, respectively. The 2-year DMFS rate was similarly equivalent: 76% with nivolumab monotherapy, 73% with the combination. And similar to what you had talked about with CheckMate 915, unfortunately, the addition of LAG-3 did not appear to improve the RFS or DMFS compared to control in this patient population. So, tell us a little bit about your take on this and what do you think might be the reasons why this trial was negative? Dr. Jason Luke: It's really unfortunate that we have this negative phase 3 trial. There had been a lot of hope that the combination of nivolumab with relatlimab would be a better tolerated combination that increased the efficacy. So in the metastatic setting, we do have 047, the study that demonstrated nivolumab plus relatlimab, but now we have this negative trial in the adjuvant setting. And so as to why exactly, I think is a complicated scenario. You know, when we look at the hazard ratios for relapse-free survival, the primary endpoint, as well as the secondary endpoints for distant metastasis-free survival, we see that the hazard ratio is approximately 1. So there's basically no difference. And that really suggests that relatlimab in this setting had no impact whatsoever on therapeutic outcomes in terms of efficacy. Now, it's worth noting that there was a biomarker subanalysis that was presented in conjunction with these data that looked at some immunophenotyping, both from circulating T cells, CD8 T cells, as well as from the tumor microenvironment from patients who were treated, both in the previous metastatic trial, the RELATIVITY-047 study, and now in this adjuvant study in the RELATIVITY-098 study. And to briefly summarize those, what was identified was that T cells in advanced melanoma seemed to have higher expression levels of LAG-3 relative to T cells that are circulating in patients that are in the adjuvant setting. In addition to that, there was a suggestion that the magnitude of increase is greater in the advanced setting versus adjuvant. And the overall summary of this is that the suggested rationale for why this was a negative trial may have been that the target of LAG-3 is not expressed as highly in the adjuvant setting as it is in the metastatic setting. And so while the data that were presented, I think, support this kind of an idea, I am a little bit cautious that this is actually the reason for why the trial was negative, however. I would say we're not really sure yet as to why the trial was negative, but the fact that the hazard ratios for the major endpoints were essentially 1 suggests that there was no impact whatsoever from relatlimab. And this really makes one wonder whether or not building on anti–PD-1 in the adjuvant setting is feasible because anti–PD-1 works so well. You would think that even if the levels of LAG-3 expression were slightly different, you would have seen a trend in one direction or another by adding a second drug, relatlimab, in this scenario. So overall, I think it's an unfortunate circumstance that the trial is negative. Clearly there's going to be no role for relatlimab in the adjuvant setting. I think this really makes one wonder about the utility of LAG-3 blockade and how powerful it really can be. I think it's probably worth pointing out there's another adjuvant trial ongoing now of a different PD-1 and LAG-3 combination, and that's cemiplimab plus fianlimab, a LAG-3 antibody that's being dosed from another trial sponsor at a much higher dose, and perhaps that may make some level of difference. But certainly, these are unfortunate results that will not advance the field beyond where we were at already. Dr. Diwakar Davar: And to your point about third-generation checkpoint factors that were negative, I guess it's probably worth noting that a trial that you were involved with, KeyVibe-010, that evaluated the PD-1 TIGIT co-formulation of vibostolimab, MK-4280A, was also, unfortunately, similarly negative. So, to your point, it's not clear that all these third-generation receptors are necessarily going to have the same impact in the adjuvant setting, even if they, you know, for example, like TIGIT, and they sometimes may not even have an effect at all in the advanced cancer setting. So, we'll see what the HARMONY phase 3 trial, that's the Regeneron cemiplimab/fianlimab versus pembrolizumab control with cemiplimab with fianlimab at two different doses, we'll see how that reads out. But certainly, as you've said, LAG-3 does not, unfortunately, appear to have an impact in the adjuvant setting. So let's move on to LBA9501. This is the primary analysis of EORTC-2139-MG or the Columbus-AD trial. This was a randomized trial of encorafenib and binimetinib, which we will abbreviate as enco-bini going forward, compared to placebo in high-risk stage II setting in melanoma in patients with BRAF V600E or K mutant disease. So Jason, you know, you happen to know one or two things about the resected stage II setting, so maybe contextualize the stage II setting for us based on the trials that you've led, KEYNOTE-716, as well as CheckMate-76K, set us up to talk about Columbus-AD. Dr. Jason Luke: Thanks for that introduction, and certainly stage II disease has been something I've worked a lot on. The rationale for that has been that building off of the activity of anti–PD-1 in metastatic melanoma and then seeing the activity in stage III, like we just talked about, it was a curious circumstance that dating back about 7 to 8 years ago, there was no availability to use anti–PD-1 for high-risk stage II patients, even though the risk of recurrence and death from melanoma in the context of stage IIB and IIC melanoma is in fact similar or actually higher than in stage IIIA or IIIB, where anti–PD-1 was approved. And in that context, a couple of different trials that you alluded to, the Keynote-716 study that I led, as well as the CheckMate 76K trial, evaluated pembrolizumab and nivolumab, respectively, showing an improvement in relapse-free and distant metastasis-free survival, and both of those agents have subsequently been approved for use in the adjuvant setting by the US FDA as well as the European Medicines Agency. So bringing then to this abstract, throughout melanoma oncology, we've seen that the impact of anti–PD-1 immunotherapy versus BRAF and MEK-targeted therapy have had very similar outcomes on a sort of comparison basis, both in frontline metastatic and then in adjuvant setting. So it was a totally reasonable question to ask: Could we use adjuvant BRAF and MEK inhibitor therapy? And I think all of us expected the answer would be yes. As we get into the discussion of the trial, I think the unfortunate circumstance was that the timing of this clinical trial being delayed somewhat, unfortunately, made it very difficult to accrue the trial, and so we're going to have to try to read through the tea leaves sort of, based on only a partially complete data set. Dr. Diwakar Davar: So, in terms of the results, they wanted to enroll 815 patients, they only enrolled 110. The RFS and DMFS were marginally improved in the treatment arm but certainly not significantly, which is not surprising because the trial had only accrued 16% to 18% of its complete accrual. As such, we really can't abstract from the stage III COMBI-AD data to stage II patients. And certainly in this setting, one would argue that the primary treatment options certainly remain either anti–PD-1 monotherapy, either with pembrolizumab or nivolumab, based on 716 or 76K, or potentially active surveillance for the patients who are not inclined to get treated. Can you tell us a little bit about how you foresee drug development going forward in this space because, you know, for example, with HARMONY, certainly IIC disease is a part of HARMONY. We will know at least a little bit about that in this space. So what do you think about the stage IIB/C patient population? Is this a patient population in which future combinations are going to be helpful, and how would you think about where we can go forward from here? Dr. Jason Luke: It is an unfortunate circumstance that this trial could not be accrued at the pace that was necessary. I think all of us believe that the results would have been positive if they'd been able to accrue the trial. In the preliminary data set that they did disclose of that 110 patients, you know, it's clear there is a difference at a, you know, a landmark at a year. They showed a 16% difference, and that would be in line with what has been seen in stage III. And so, you know, I think it's really kind of too bad. There's really going to be no regulatory approach for this consideration. So using BRAF and MEK inhibition in stage II is not going to be part of standard practice moving into the future. To your point, though, about where will the field go? I think what we're already realizing is that in the adjuvant setting, we're really overtreating the total population. And so beyond merely staging by AJCC criteria, we need to move to biomarker selection to help inform which patients truly need the treatment. And in that regard, I don't think we've crystallized together as a field as yet, but the kinds of things that people are thinking about are the integration of molecular biomarkers like ctDNA. When it's positive, it can be very helpful, but in melanoma, we found that, unfortunately, the rates are quite low, you know, in the 10% to 15% range in the adjuvant setting. So then another consideration would be factors in the primary tumor, such as gene expression profiling or other considerations. And so I think the future of adjuvant clinical trials will be an integration of both the standard AJCC staging system as well as some kind of overlaid molecular biomarker that helps to enrich for a higher-risk population of patients because on a high level, when you abstract out, it's just clearly the case that we're rather substantially overtreating the totality of the population, especially given that in all of our adjuvant studies to date for anti–PD-1, we have not yet shown that there's an overall survival advantage. And so some are even arguing perhaps we should even reserve treatment until patients progress. I think that's a complicated subject, and standard of care at this point is to offer adjuvant therapy, but certainly a lot more to do because many patients, you know, unfortunately, still do progress and move on to metastatic disease. Dr. Diwakar Davar: Let's transition to Abstract 2508. So we're moving on from the melanoma to the novel immunotherapy abstracts. And this is a very, very, very fascinating drug. It's IMA203. So Abstract 2508 is a phase 1 clinical update of IMA203. IMA203 is an autologous TCR-T construct targeting PRAME in patients with heavily pretreated PD-1-refractory metastatic melanoma. So Jason, in the PD-1 and CTLA-4-refractory settings, treatment options are either autologous TIL, response rate, you know, ballpark 29% to 31%, oncolytic viral therapy, RP1 with nivolumab, ORR about 30-ish percent. So new options are needed. Can you tell us a little bit about IMA203? Perhaps tell us for the audience, what is the difference between a TCR-T and traditional autologous TIL? And a little bit about this drug, IMA203, and how it distinguishes itself from the competing TIL products in the landscape. Dr. Jason Luke: I'm extremely enthusiastic about IMA203. I think that it really has transformative potential based on these results and hopefully from the phase 3 trial that's open to accrual now. So, what is IMA203? We said it's a TCR-T cell product. So what that means is that T cells are removed from a patient, and then they can be transduced through various technologies, but inserted into those T cells, we can then add a T-cell receptor that's very specific to a single antigen, and in this case, it's PRAME. So that then is contrasted quite a bit from the TIL process, which includes a surgical resection of a tumor where T cells are removed, but they're not specific necessarily to the cancer, and they're grown up in the lab and then given to the patient. They're both adoptive cell transfer products, but they're very different. One is genetically modified, and the other one is not. And so the process for generating a TCR-T cell is that patients are required to have a new biomarker that some may not be familiar with, which is HLA profiling. So the T-cell receptor requires matching to the concomitant HLA for which the peptide is bound in. And so the classic one that is used in most oncology practices is A*02:01 because approximately 48% of Caucasians have A*02:01, and the frequency of HLA in other ethnicities starts to become highly variable. But in patients who are identified to have A*02:01 genotype, we can then remove blood via leukapheresis or an apheresis product, and then insert via lentiviral transduction this T-cell receptor targeting PRAME. Patients are then brought back to the hospital where they can receive lymphodepleting chemotherapy and then receive the reinfusion of the TCR-T cells. Again, in contrast with the TIL process, however, these T cells are extremely potent, and we do not need to give high-dose interleukin-2, which is administered in the context of TIL. Given that process, we have this clinical trial in front of us now, and at ASCO, the update was from the phase 1 study, which was looking at IMA203 in an efficacy population of melanoma patients who were refractory at checkpoint blockade and actually multiple lines of therapy. So here, there were 33 patients and a response rate of approximately 50% was observed in this population of patients, notably with a duration of response approximately a year in that treatment group. And I realize that these were heavily pretreated patients who had a range of very high-risk features. And approximately half the population had uveal melanoma, which people may be aware is a generally speaking more difficult-to-treat subtype of melanoma that metastasizes to the liver, which again has been a site of resistance to cancer immunotherapy. So these results are extremely promising. To summarize them from what I said, it's easier to make TCR-T cells because we can remove blood from the patient to transduce the T cells, and we don't have to put them through surgery. We can then infuse them, and based on these results, it looks like the response rate to IMA203 is a little bit more than double what we expect from lifileucel. And then, whereas with lifileucel or TILs, we have to give high-dose IL-2, here we do not have to give high-dose IL-2. And so that's pretty promising. And a clinical trial is ongoing now called the SUPREME phase 3 clinical trial, which is hoping to validate these results in a randomized global study. Dr. Diwakar Davar: Now, one thing that I wanted to go over with you, because you know this trial particularly well, is what you think of the likelihood of success, and then we'll talk a little bit about the trial design. But in your mind, do you think that this is a trial that has got a reasonable likelihood of success, maybe even a high likelihood of success? And maybe let's contextualize that to say an alternative trial, such as, for example, the TebeAM trial, which is essentially a T-cell bispecific targeting GP100. It's being compared against SOC, investigator's choice control, also in a similarly heavily pretreated patient population. Dr. Jason Luke: So both trials, I think, have a strong chance of success. They are very different kinds of agents. And so the CD3 bispecific that you referred to, tebentafusp, likely has an effect of delaying progression, which in patients with advanced disease could have a value that might manifest as overall survival. With TCR-T cells, by contrast, we see a very high response rate with some of the patients going into very durable long-term benefit. And so I do think that the SUPREME clinical trial has a very high chance of success. It will be the first clinical trial in solid tumor oncology randomizing patients to receive a cell therapy as compared with a standard of care. And within that standard of care control arm, TILs are allowed as a treatment. And so it will also be the first study that will compare TCR-T cells against TILs in a randomized phase 3. But going back to the data that we've seen in the phase 1 trial, what we observe is that the duration of response is really connected to the quality of the response, meaning if you have more than a 50% tumor shrinkage, those patients do very, very well. But even in patients who have less than 50% tumor shrinkage, the median progression-free survival right now is about 4.5 months. And again, as we think about trial design, standard of care options for patients who are in this situation are unfortunately very bad. And the progression-free survival in that population is probably more like 2 months. So this is a trial that has a very high likelihood of being positive because the possibility of long-term response is there, but even for patients who don't get a durable response, they're likely going to benefit more than they would have based on standard chemotherapy or retreatment with an anti–PD-1 agent. Dr. Diwakar Davar: Really, a very important trial to enroll, a trial that is first in many ways. First of a new generation of TCR-T agents, first trial to look at cell therapy in the control arm, a new standard of efficacy, but potentially also if this trial is successful, it will also be a new standard of trial conduct, a new kind of trial, of a set of trials that will be done in the second-line immunotherapy-refractory space. So let's pivot to the last trial that we were going to discuss, which was Abstract 2501. Abstract 2501 is a first-in-human phase 1/2 trial evaluating BNT142, which is the first-in-class mRNA-encoded bispecific targeting Claudin-6 and CD3 in patients with Claudin-positive tumors. We'll talk a little bit about this, but maybe let's start by talking a little bit about Claudin-6. So Claudin-6 is a very interesting new target. It's a target that's highly expressed in GI and ovarian tumors. There are a whole plethora of Claudin-6-targeting agents, including T-cell bispecifics and Claudin-6-directed CAR-Ts that are being developed. But BNT142 is novel. It's a novel lipid nanoparticle LNP-encapsulated mRNA. The mRNA encodes an anti–Claudin-6 CD3 bispecific termed RiboMAB-021. And it then is administered to the patient. The BNT142-encoding mRNA LNPs are taken up by the liver and translated into the active drug. So Jason, tell us a little bit about this agent. Why you think it's novel, if you think it's novel, and let's talk a little bit then about the results. Dr. Jason Luke: So I certainly think this is a novel agent, and I think this is just the first of what will probably become a new paradigm in oncology drug development. And so you alluded to this, but just to rehash it quickly, the drug is encoded as genetic information that's placed in the lipid nanoparticle and then is infused into the patient. And after the lipid nanoparticles are taken up by the liver, which is the most common place that LNPs are usually taken up, that genetic material in the mRNA starts to be translated into the actual protein, and that protein is the drug. So this is in vivo generation, so the patient is making their own drug inside their body. I think it's a really, really interesting approach. So for any drug that could be encoded as a genetic sequence, and in this case, it's a bispecific, as you mentioned, CD3-Claudin-6 engager, this could have a tremendous impact on how we think about pharmacology and novel drug development moving into the future in oncology. So I think it's an extremely interesting drug, the like of which we'll probably see only more moving forward. Dr. Diwakar Davar: Let's maybe briefly talk about the results. You know, the patient population was heavily pretreated, 65 or so patients, mostly ovarian cancer. Two-thirds of the patients were ovarian cancer, the rest were germ cell and lung cancer patients. But let's talk a little bit about the efficacy. The disease control rate was about 58% in the phase 1 population as a whole, but 75% in the ovarian patient population. Now tell us a little bit about the interesting things about the drug in terms of the pharmacokinetics, and also then maybe we can pivot to the clinical activity by dose level. Dr. Jason Luke: Well, so they did present in their presentation at ASCO a proportionality showing that as higher doses were administered, that greater amounts of the drug were being made inside the patient. And so that's an interesting observation, and it's an important one, right? Suggesting that the pharmacology that we classically think of by administering drugs by IV, for example, would still be in play. And that did translate into some level of efficacy, particularly at the higher dose levels. Now, the caveat that I'll make a note of is that disease control rate is an endpoint that I think we have to be careful about because what that really means is sometimes a little bit unclear. Sometimes patients have slowly growing tumors and so on and so forth. And the clinical relevance of disease control, if it doesn't last at least 6 months, I think is probably pretty questionable. So I think these are extremely interesting data, and there's some preliminary sense that getting the dose up is going to matter because the treatment responses were mostly observed at the highest dose levels. There's also a caveat, however, that across the field of CD3 bispecific molecules like this, there's been quite a bit of heterogeneity in terms of the response rate, with some of them only really generating stable disease responses and other ones having more robust responses. And so I think this is a really interesting initial foray into this space. My best understanding is this molecule is not moving forward further after this, but I think that this really does set it up to be able to chase after multiple different drug targets on a CD3 bispecific backbone, both in ovarian cancer, but then basically across all of oncology. Dr. Diwakar Davar: Perfect. This is a very new sort of exciting arena where we're going to be looking at, in many ways, these programmable constructs, whether we're looking at in vivo-generated, in this case, a T-cell bispecific, but we've also got newer drugs where we are essentially giving drugs where people are generating in vivo CAR T, and also potentially even in vivo TCR-T. But certainly lots of new excitement around this entire class of drugs. And so, what we'd like to do at this point in time is switch to essentially the fact that we've got a very, very exciting set of data at ASCO 2025. You've heard from Dr. Luke regarding the advances in both early drug development but also in advanced cutaneous melanoma. And Jason, as always, thank you so much for sharing your very valuable and great, fantastic insights with us on the ASCO Daily News Podcast. Dr. Jason Luke: Well, thanks again for the opportunity. Dr. Diwakar Davar: And thank you to our listeners for taking your time to listen today. You will find the links to the abstracts that we discussed today in the transcript of this episode. And finally, if you value the insights that you hear on the ASCO Daily News Podcast, please take a moment to rate, review, and subscribe wherever you get your podcasts. Disclaimer: The purpose of this podcast is to educate and to inform. This is not a substitute for professional medical care and is not intended for use in the diagnosis or treatment of individual conditions. Guests on this podcast express their own opinions, experience, and conclusions. Guest statements on the podcast do not express the opinions of ASCO. The mention of any product, service, organization, activity, or therapy should not be construed as an ASCO endorsement. Follow today's speakers: Dr. Diwakar Davar @diwakardavar Dr. Jason Luke @jasonlukemd Follow ASCO on social media: @ASCO on Twitter ASCO on Bluesky ASCO on Facebook ASCO on LinkedIn Disclosures: Dr. Diwakar Davar: Honoraria: Merck, Tesaro, Array BioPharma, Immunocore, Instil Bio, Vedanta Biosciences Consulting or Advisory Role: Instil Bio, Vedanta Biosciences Consulting or Advisory Role (Immediate family member): Shionogi Research Funding: Merck, Checkmate Pharmaceuticals, CellSight Technologies, GSK, Merck, Arvus Biosciences, Arcus Biosciences Research Funding (Inst.): Zucero Therapeutics Patents, Royalties, Other Intellectual Property: Application No.: 63/124,231 Title: COMPOSITIONS AND METHODS FOR TREATING CANCER Applicant: University of Pittsburgh–Of the Commonwealth System of Higher Education Inventors: Diwakar Davar Filing Date: December 11, 2020 Country: United States MCC Reference: 10504-059PV1 Your Reference: 05545; and Application No.: 63/208,719 Enteric Microbiotype Signatures of Immune-related Adverse Events and Response in Relation to Anti-PD-1 Immunotherapy Dr. Jason Luke: Stock and Other Ownership Interests: Actym Therapeutics, Mavu Pharmaceutical, Pyxis, Alphamab Oncology, Tempest Therapeutics, Kanaph Therapeutics, Onc.AI, Arch Oncology, Stipe, NeoTX Consulting or Advisory Role: Bristol-Myers Squibb, Merck, EMD Serono, Novartis, 7 Hills Pharma, Janssen, Reflexion Medical, Tempest Therapeutics, Alphamab Oncology, Spring Bank, Abbvie, Astellas Pharma, Bayer, Incyte, Mersana, Partner Therapeutics, Synlogic, Eisai, Werewolf, Ribon Therapeutics, Checkmate Pharmaceuticals, CStone Pharmaceuticals, Nektar, Regeneron, Rubius, Tesaro, Xilio, Xencor, Alnylam, Crown Bioscience, Flame Biosciences, Genentech, Kadmon, KSQ Therapeutics, Immunocore, Inzen, Pfizer, Silicon Therapeutics, TRex Bio, Bright Peak, Onc.AI, STipe, Codiak Biosciences, Day One Therapeutics, Endeavor, Gilead Sciences, Hotspot Therapeutics, SERVIER, STINGthera, Synthekine Research Funding (Inst.): Merck , Bristol-Myers Squibb, Incyte, Corvus Pharmaceuticals, Abbvie, Macrogenics, Xencor, Array BioPharma, Agios, Astellas Pharma , EMD Serono, Immatics, Kadmon, Moderna Therapeutics, Nektar, Spring bank, Trishula, KAHR Medical, Fstar, Genmab, Ikena Oncology, Numab, Replimmune, Rubius Therapeutics, Synlogic, Takeda, Tizona Therapeutics, Inc., BioNTech AG, Scholar Rock, Next Cure Patents, Royalties, Other Intellectual Property: Serial #15/612,657 (Cancer Immunotherapy), and Serial #PCT/US18/36052 (Microbiome Biomarkers for Anti-PD-1/PD-L1 Responsiveness: Diagnostic, Prognostic and Therapeutic Uses Thereof) Travel, Accommodations, Expenses: Bristol-Myers Squibb, Array BioPharma, EMD Serono, Janssen, Merck, Novartis, Reflexion Medical, Mersana, Pyxis, Xilio
This week on The AI Report, Liam Lawson sits down with Gordon Wintrob, co-founder and CTO of Newfront, to talk about bringing AI into one of the slowest-moving industries: insurance.Gordon shares how Newfront is redesigning the broker experience with automation and AI—from parsing 200-page policies in seconds to helping HR teams save weeks of work. They discuss building AI tools that clients actually trust, how to manage risk in regulated industries, and why embedding AI into company culture matters as much as the code.Also in this episode: • Why insurance is one of the last big frontiers for tech • What makes a good AI use case in complex workflows • The story behind Benji, Newfront's internal AI assistant • How to foster internal adoption from hiring to hackathons • What regulation and SOC 2 mean for AI innovationThis is a real look at what happens when AI goes beyond chatbots and into core business infrastructure.Subscribe to The AI Report:https://theaireport.beehiiv.com/subscribeJoin the community:https://www.skool.com/the-ai-report-community/aboutChapters:(00:00) Reimagining the Insurance Stack(01:06) Why Insurance Feels So Behind(02:41) How Brokers Work and Where AI Fits(05:08) Founding Newfront With Future Tech in Mind(06:59) Automating Contract Review at Scale(08:49) Working With Startups and Industry Giants(10:19) What It's Like Serving Diverse Client Profiles(12:17) Making Room for Value-Add Conversations(13:28) Key AI Tools: Benji, Gap Analysis, and More(15:29) Why Products Succeed or Fail in Legacy Fields(16:39) Creating a Culture of Technical Curiosity(18:25) From Engineering to Recruiting: AI in the Org(19:30) Equity, Values, and Ownership at Scale(21:50) What Keeps Traditional Brokerages Behind(23:43) AI as a Signal of Operator Leverage(25:22) Who Newfront Builds For(25:56) Staying Compliant While Moving Fast(28:39) Managing Data Risk in a Privacy-Critical Industry(29:01) Vendor Security and SOC 2 in AI Development(30:25) Expanding AI Beyond the Frontend(31:58) CTO Strategy and Time Allocation(32:54) Staying Up-to-Date in a Fast-Shifting Landscape(34:42) Building With Purpose in a Legacy System(36:11) Connect With Gordon
Send us a textReturning guest Novadene Miller is a skilled and motivational teacher. She draws from her experience earning a doctorate in Geography to bring multiple perspectives and resources to the classroom. In this episode she shares how her Humanities students build cross-disciplinary skills like critical thinking, collaborative skills, and research skills while engaging in many different activities both in and out of the classroom. She also talks about the many resources that can be used beyond the typical books and internet searches so often relied upon.Each example shows how the IB framework gives her students the space to inquire and be curious about the world around them and to give voice and value to their own ideas.Novadene's links: LinkedInIB Blog posts: Teaching service as action , Teaching MYP Ind. & Soc. in a changing worldArticle for the Independent Schools Network (ISN)Additional ISN articles: Teaching skills applied beyond the classroom , Celebrating World Children's Day in your ClassroomNovadene's research: Achieving Sustainability of Natural Resources and obtaining Economic Goals. Tourism's Pandora's boxEmail IB Matters: IBMatters@mnibschools.orgTwitter @MattersIBIB Matters websiteMN Association of IB World Schools (MNIB) websiteDonate to IB Matters Podcast: Education by Design with host Phil Evans IB Matters T-shirts (and other MNIB clothing) To appear on the podcast or if you would like to sponsor the podcast, please contact us at the email above.
In this episode, Patrick McKenzie (@patio11) is joined by Jennifer Li, a general partner at a16z investing in enterprise, infrastructure and AI. Jennifer breaks down how AI workloads are creating new demands on everything from inference pipelines to observability systems, explaining why we're seeing a bifurcation between language models and diffusion models at the infrastructure level. They explore emerging categories like reinforcement learning environments that help train agents, the evolution of web scraping for agentic workflows, and why Jennifer believes the API economy is about to experience another boom as agents become the primary consumers of software interfaces.–Full transcript: www.complexsystemspodcast.com/the-ai-infrastructure-stack-with-jennifer-li-a16z/–Sponsor: VantaVanta automates security compliance and builds trust, helping companies streamline ISO, SOC 2, and AI framework certifications. Learn more at https://vanta.com/complex–Links:Jennifer Li's writing at a16z https://a16z.com/author/jennifer-li/ –Timestamps:(00:00) Intro(00:55) The AI shift and infrastructure(02:24) Diving into middleware and AI models(04:23) Challenges in AI infrastructure(07:07) Real-world applications and optimizations(15:15) Sponsor: Vanta(16:38) Real-world applications and optimizations (cont'd)(19:05) Reinforcement learning and synthetic environments(23:05) The future of SaaS and AI integration(26:02) Observability and self-healing systems(32:49) Web scraping and automation(37:29) API economy and agent interactions(44:47) Wrap
Andrea Malagodi, CTO of Sonar, discusses how the company successfully transitioned from on-premise to SaaS, leveraging AWS partnership and maintaining focus on developer-centric code quality and security solutions.Topics Include:Andrea Malagodi is CTO of Sonar, guest on podcastSonar founded 16+ years ago by three software engineersFounders wanted to help developers understand code quality issuesFocus on giving developers precise, actionable insights for improvementProducts include SonarQube Server, Cloud, and IDE versionsRecent acquisitions: ACR, Tidelift, and Structure 101 companiesSaaS journey began seven years ago with SonarQube CloudInitially targeted individual developers, then expanded to enterprisesNow multi-region with comprehensive enterprise features availableSeven million developers rely on Sonar's solutions globally400,000 organizations and 28,000 enterprise customers use SonarStarted SaaS to test market demand, not assumptionsEngaged customers early to understand migration requirements neededRecommends alpha versions with design customers for feedbackFree tier for open-source code enables quick trialEnterprise certifications (ISO 27001, SOC 2) build trustAWS partnership includes enterprise support and technical resourcesUsed CDK for infrastructure-as-code, experienced early adoption challengesMulti-region strategy should be considered from the beginningAWS Learning partnership certified all engineers in cloudCloud enables faster development cycles than traditional infrastructureRecommends avoiding architectural one-way doors during transitionConsider data residency requirements for global customer baseAI-generated code creates productivity gains but needs validationSonar provides deterministic rules for AI-generated code reviewWorking on MCP protocol and AI code quality solutionsSecurity approach is "start left" not "shift left"Advanced Security offering includes dependency scanning and vulnerabilitiesAvailable on sonarsource.com and AWS MarketplaceFree tier offers 50,000 lines of code analysisParticipants:Andrea Malagodi – Chief Technical Officer, SonarFurther Links:Website: www.sonarsource.comSonar in the AWS MarketplaceSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon.com/isv/
Off-the-shelf didn't cut it, so we built what we needed using open hardware and open source.Sponsored By:Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. Unraid: A powerful, easy operating system for servers and storage. Maximize your hardware with unmatched flexibility. Support LINUX UnpluggedLinks:
Artificial intelligence has firmly established itself at the forefront of the cybersecurity agenda, creating both unprecedented opportunities and complex challenges for security leaders. In this eye-opening conversation with cybersecurity veteran Tim Sewell, we dive deep into the realities of implementing effective AI governance and security practices in today's rapidly evolving threat landscape.Tim shares invaluable insights on how AI has fundamentally transformed the cybersecurity domain, comparing this shift to the rise of desktop computing or cloud adoption. He cautions against the "wild west" approach to AI governance that many organizations have inadvertently embraced, where tools are deployed without proper oversight or awareness. Most concerning is his observation that AI is increasingly being integrated into existing business processes by vendors or partners without explicit notification, creating dangerous blind spots in security programs.The discussion reveals surprising developments in third-party risk management, where AI tools now handle everything from vendor questionnaires to SOC 2 report analysis. We explore the troubling reality of "AI sending questionnaires to AI that is responding to questionnaires," raising critical questions about trust and verification in our increasingly automated security ecosystem. Tim provides practical guidance for security teams on transparency in AI usage, particularly when making decisions that may later require justification in legal proceedings.Despite the focus on advanced AI capabilities, Tim emphasizes the continued importance of security fundamentals. He notes that sophisticated nation-state actors are increasingly targeting basic vulnerabilities like buffer overflows and cross-site scripting, especially in critical infrastructure with legacy technologies. For new security leaders, his advice is refreshingly straightforward: identify what you're protecting, assess existing controls, and practice your incident response.Listen now for essential insights on navigating the AI security landscape, from governance frameworks to practical implementation strategies that balance innovation with risk management. Whether you're a CISO looking to update your program or a security professional wanting to stay ahead of emerging threats, this episode delivers actionable knowledge for securing your organization in the age of artificial intelligence.
Kanaiya Vasani, Chief Product Officer, explains how ExtraHop leverages AWS services and generative AI to help enterprise customers address the growing security challenges of uncontrolled AI adoption.Topics Include:ExtraHop reinventing network detection and response categoryPlatform addresses security, performance, compliance, forensic use casesBehavioral analysis identifies potential security threats in infrastructureNetwork observability and attack surface discovery capabilities includedApplication and network performance assurance built-in featuresTraditional IDS capability with rules and IOCs detectionPacket forensics for investigating threats and wire evidenceCloud-native implementations and compromised credential investigation supportExtraHop partnership with AWS spans 35-40 different servicesAWS handles infrastructure while ExtraHop focuses core competenciesExtraHop early adopter of generative AI in NDRNatural language interface enables rapid data access queriesEnglish questions replace complex query languages for usersAgentic AI experiments focus on SOC automation workflowsL1 and L2 analyst workflow automation improves productivityShadow AI creates major risk concern for customersUncontrolled chatbot usage risks accidental data leakageGovernance structures needed around enterprise gen AI usageVisibility required into LLM usage across infrastructure endpointsAI innovation pace challenges security industry keeping upModels evolved from billion to trillion parameters rapidlyTraditional security tools focus policies, miss real-time activity"Wire doesn't lie" - network traffic reveals actual behaviorExtraHop maps baseline behavior patterns across infrastructure endpointsAnomalous behavioral patterns flagged through network traffic analysisMCP servers enable LLM access through standardized protocolsStolen tokens allow adversaries unauthorized MCP server accessMachine learning identifies anomalous traffic patterns L2-L7 protocolsGen AI automates incident triage, investigation, response workflowsBest practices include clear policies, governance, monitoring, educationParticipants:Kanaiya Vasani – Chief Product Officer, ExtraHop NetworksSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon.com/isv/Notes:
Today's show:Meta just took a 49% stake in Scale AI, and the shockwaves are hitting the entire AI ecosystem. In this episode, @Jason and @alex unpack the deal's implications: Google ($150M customer!) and others are fleeing Scale, worried Meta will hoard its RLHF infrastructure and cut off competitors. Startups like Labelbox, Turing, and Handshake are already seeing a demand surge. Is this smart vertical integration or anti-competitive overreach? Jason shares tactical advice for founders on how to capitalize when incumbents stumble—hire ex-Scale talent, build “Scale AI alternative” SEO pages, and hit the podcast circuit. Don't miss this deep dive into AI's shifting power dynamics.Timestamps:(04:01) Is Jason becoming an AI doomer?!(9:52) OpenPhone - Streamline and scale your customer communications with OpenPhone. Get 20% off your first 6 months at www.openphone.com/twist(13:47) PostHog, and when is it okay for founders to break the rules?(20:56) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(25:50) Why the Navy is recruiting startups(30:12) Pilot - Visit https://www.pilot.com/twist and get $1,200 off your first year.(39:09) Did Zuck buy Scale in order to keep it from competitors?(56:08) When does incentivizing customers turn into burning capital?(1:04) How raising too much money could KILL your startup!Subscribe to the TWiST500 newsletter: https://ticker.thisweekinstartups.comCheck out the TWIST500: https://www.twist500.comSubscribe to This Week in Startups on Apple: https://rb.gy/v19fcpFollow Lon:X: https://x.com/lonsFollow Alex:X: https://x.com/alexLinkedIn: https://www.linkedin.com/in/alexwilhelmFollow Jason:X: https://twitter.com/JasonLinkedIn: https://www.linkedin.com/in/jasoncalacanisThank you to our partners:(9:52) OpenPhone - Streamline and scale your customer communications with OpenPhone. Get 20% off your first 6 months at www.openphone.com/twist(20:56) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(30:52) Pilot - Visit https://www.pilot.com/twist and get $1,200 off your first year.Great TWIST interviews: Will Guidara, Eoghan McCabe, Steve Huffman, Brian Chesky, Bob Moesta, Aaron Levie, Sophia Amoruso, Reid Hoffman, Frank Slootman, Billy McFarlandCheck out Jason's suite of newsletters: https://substack.com/@calacanisFollow TWiST:Twitter: https://twitter.com/TWiStartupsYouTube: https://www.youtube.com/thisweekinInstagram: https://www.instagram.com/thisweekinstartupsTikTok: https://www.tiktok.com/@thisweekinstartupsSubstack: https://twistartups.substack.comSubscribe to the Founder University Podcast: https://www.youtube.com/@founderuniversity1916
In this sponsored Soap Box edition of the Risky Business podcast Patrick Gray chats with Dropzone AI founder Ed Wu about the role of LLMs in the SOC. The debate about whether AI agents are going to wind up in the SOC is over, they've already arrived. But what are they good for? What are they NOT good for? And where else will we see AI popping up in security? This episode is also available on Youtube. Show notes