Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Password Managers Protect You From Cyber Attacks

Are your passwords strong enough to keep hackers out? Cybercriminals use attacks like brute force, credential stuffing and keyloggers to steal your sensitive information, but a password manager can stop them in their tracks. In this video, we’ll show you how a password manager protects your account.

Why Data Unification is a Major Challenge for Enterprises

Why Data Unification is a Major Challenge for Enterprises In this SourceForge video, Carlo Alpuerto of A10 Networks identifies a significant challenge in cybersecurity: the unification of data. He explains that while the goal is for systems to feed one another, many solutions are "Frankensteined together," making it difficult to achieve this integration.

The Surprising Truth About GPT-5 in Cursor's Agent Mode

In this video, I test out GPT-5 by asking it to build a simple and secure Node.js notes app that lets users create, read, update, and delete notes. I run two experiments — one without a security MCP server and one with it — to see how well the new model handles both functionality and security.

Introducing One Identity Cloud

One Identity helps organizations strengthen cybersecurity, boost efficiency and control costs through the One Identity Fabric, a holistic approach to identity and access management (IAM). By unifying IAM tools, including identity governance and administration (IGA), access management (AM), privileged access management (PAM), and Active Directory management (AD Mgmt), it ensures optimal functionality and efficiency. This cohesive structure reduces identity sprawl and extends governance to the farthest endpoints of your IAM ecosystem.

AI Cybersecurity & Fact Check

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

The 2025 Cost of a Breach Report - The 443 Podcast - Episode 340

This week on the podcast, we discuss key findings from IBM and the Ponemon Institute's 2025 Cost of a Breach Report, including a deep analysis of AI impacts in cybersecurity. Before that, we cover Norway's claim that Russian-aligned hackers opened a floodgate in one of their dams. We also discuss a vulnerability in Microsoft 365 Copilot that allowed the AI to delete its own audit logs. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.