Let's SOC About It

D3 Security

Let's SOC About It is a cybersecurity podcast by D3 Security that answers the big and small questions in cybersecurity. Join Amy Tom in conversation with industry experts to explore the ins-and-outs of cybersecurity.

  1. 5 DAYS AGO

    Prompt Kiddies & AI Phishing: How Cybercriminals Are Using AI to Outsmart Your Security Stack

    Amy Tom sits down with Ali Alame, co-founder and CTO of CyberArmor, to talk about what's actually happening in the world of AI-generated phishing attacks. Ali shares what his team is seeing on the front lines: from 13-year-old hackers running phishing campaigns between classes, to criminal organizations running internship programs for budding cybercriminals. They dig into how attackers are bypassing AI guardrails on tools like ChatGPT and Grok, why MFA isn't the silver bullet we think it is, and why shutting down phishing sites may actually be doing more harm than good. If you think your security stack has you covered, this episode will make you think twice. In this episode, you'll learn: 🤔 How are cybercriminals using mainstream AI tools to build phishing kits, and why aren't the guardrails stopping them? 🧑‍💻 Who exactly are these attackers, and how young are they getting? 🐟 Why do Microsoft phishing kits dominate the threat landscape? 👀 If MFA can be hijacked, what does real protection actually look like? 😱 Is dark web threat intel actually useful, or is near real-time monitoring the smarter play? Ali Alame is CTO and co‑founder of CyberArmor, the company behind DarkArmor, a pre‑breach, pre‑dark‑web threat intelligence platform. With a background in cloud and security across IBM, Lululemon, and UBC, Ali focuses on turning attacker‑side telemetry into operational early warning for SOC teams, MSSPs, and large enterprises. Relevant links: Check out CyberArmor: https://cyberarmor.tech/ Follow Ali on LinkedIn: https://www.linkedin.com/in/aalame/

    27 min
  2. 12 FEB

    How do you unify Security Operations?

    They say modern SOCs are drowning in alerts. But what if the real problem is not the tools, it is the lack of strategy and unification? In this episode of the podcast, Amy Tom sits down with Reza Adineh, SOC Architect and Detection Engineer, to break down why today’s security operations models are fundamentally misaligned and what to do about it. Reza introduces his new framework, UTIOM - Unified Threat Informed Operational Model, designed to bring strategy, visibility, detection, and response into one cohesive cycle. In this episode, you'll learn:
 👉 Why most SOCs operate like “alert factories” and how that leads to burnout and false positives
 🎯 What it really means to protect your “crown jewels” and align detection to real threats
 🔁 Why strategy must guide tools, automation, and response, not the other way around
 🚀 How to communicate a unifying security vision across a 100 person SOC team If your SOC feels siloed, overwhelmed, or disconnected from the business it is meant to protect, this episode will challenge how you think about security operations and give you a blueprint to unify it. Relevant Links: Learn more about UTIOM: https://utiom.de/what-is-utiom/ Follow Reza on LinkedIn: https://www.linkedin.com/in/rezaadineh/ Follow Reza on GitHub: https://github.com/ReZaAdineH Timestamps: 00:00 Why is the current SOC operating model fundamentally broken?
 10:00 What does unification look like in practical terms inside a SOC?
 12:31 What does strategy actually look like in a real world example?
 18:17 How should a SOC analyst think about protecting crown jewels day to day?
 23:13 How do you unify strategy across a 100 person SOC team?
 24:06 How should detection engineers prioritize their rules?
 25:40 If starting from scratch, what should you prioritize first?
 27:10 How do you ensure every SOC team member truly understands the strategy?

    32 min

About

Let's SOC About It is a cybersecurity podcast by D3 Security that answers the big and small questions in cybersecurity. Join Amy Tom in conversation with industry experts to explore the ins-and-outs of cybersecurity.