The Death of SIEM
SIEM was supposed to be the nerve center of every security operation — collect every log, correlate every event, surface every threat. Most organizations ended up with an expensive log warehouse that generates more noise than signal. Recorded live from RSAC outside Moscone, Dan sits down with Justin Falck — Head of Product for Endpoint at the Enterprise Security Group at Broadcom — to break down exactly where the SIEM model broke, why "magic correlation" never showed up, and what's actually replacing it in modern security operations.
Hoodies to Headlines: The Evolution of Cybersecurity PR w/ W2 Communications
Cybersecurity went from a niche trade-press beat to a nation-state strategy domain in about 25 years. Dan Mellinger sits down with Tony Welz, co-founder of W2 Communications — a strategic communications agency that's specialized in cybersecurity for 23 years — to unpack how the story got told along the way, and who's telling it now. Tony's been in the room for nearly every inflection point: working with Sourcefire from their A-round through their Cisco acquisition, watching FireEye seed the modern threat-research content model, navigating the Target/Sony/Ashley Madison breach era, and helping clients adapt to today's SEC disclosure rules and geopolitical cyber reality.
The ROI of 3D Secure Data-Sharing: How Data-Only, Visa DCAP Interchange Savings, and the Arcot Smart Ruleset Turn Data into Profit
In this episode, we dive into Visa’s new Data Contribution Authentication Program (DCAP) and why it marks a "step change" for the 3-D Secure (3DS) ecosystem in the US and beyond. We explore how merchants are now leveraging 3DS Data-Share-Only (DSO) transactions to secure reduced interchange fees. Evidence of 3DS adoption appears in the data: 3DS volumes on the Arcot Network rose between 100% and 160% year-over-year in just one week. We dive into why more data leads to better issuer decisioning, higher approval and authorization rates, and a significant reduction in chargebacks - citing real-world results like the 6% chargeback drop seen in the Square case study. AI and the Arcot Smart Ruleset are becoming essential tools for issuers to defend against increasingly sophisticated fraudsters using LLMs to target payment vulnerabilities. Tune into this podcast to hear how the shift from using 3DS for high-risk transaction volumes to using it as a protocol for data-sharing is creating a more secure, efficient, and profitable landscape for both merchants and issuers.
Iran's Cyber Warfare Playbook: What Defenders Need to Know Right Now
With U.S. and Israeli kinetic operations in Iran (March 2026), Iranian cyber units are scrambling to retaliate in the one domain where they can fight on more equal footing. Dan Mellinger sits down with Symantec threat intelligence veteran Dick O'Brien to unpack what's actually happening on the wire — including active intrusions discovered on 5–6 organizations across the U.S. and Canada, and the recent Stryker attack that didn't use a single piece of malware. In this episode: - Why Iran punches above its weight in cyberspace (and how they got there) - The IRGC and MOIS: espionage today, sabotage tomorrow - The shift from custom disk-wipers to living-off-the-land via Microsoft Intune - How Iranian operators are borrowing Russian cloud-attack tradecraft - The surprisingly effective Iranian social engineering playbook (yes, including the Liverpool "fitness instructor" honey trap) - The little-known Iranian origins of the modern ransomware model - What defenders — especially in the U.S. — should be doing this week
A Brief History of DLP
How did Data Loss Prevention go from a forgotten niche to a boardroom necessity? In this episode, host Dan Mellinger sits down with Matt Jones, Channel Technical Director for Information Security at Broadcom's Enterprise Security Group, to trace the full arc of DLP — from its earliest roots to its role in today's enterprise security stack.