Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Is Zero Trust a Total Bust? - The 443 Podcast - Episode 339

This week on the podcast, we discuss key findings from a DefCon presentation from researchers at AmberWolf titled ZeroTrust, Total Bust and what it means for Zero Trust Network Access. After that, we review a new vulnerability in the FortiWeb WAF before ending with a quick update from Google Project Zero on a new vulnerability disclosure policy. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Why CTI Must Recommend, Not Just Report

In traditional intel roles, analysts avoid making direct recommendations. But Scott Scher explains why that doesn’t work in the business world. CTI teams can’t just present options, they need to say what should happen next. Scott breaks down why effective CTI must go beyond context and offer clear, actionable guidance for defenders. Hidden Truths: Traditional intel avoids giving direct recommendations Business leaders and defenders want clear next steps CTI teams must say.

Defending Against WAF, API, and DDoS Attacks

Defending Against WAF, API, and DDoS Attacks In this SourceForge video, Carlo Alpuerto of A10 Networks shares insights on how ThreatX protects WAF, API, DDoS, and bot attacks, processing all the information within a single database. Alpuerto highlights the platform's ability to apply these protections and actionability, showcasing how users can create and manage specific rules. He also notes that the ThreatX security operations center (SOC) team curates these rules daily, utilizing threat intelligence, CVE notifications, and zero-day news to provide comprehensive, up-to-date protection.

CTI as Cover: The Justification Behind Every Security Decision

CTI isn’t just about detecting threats, it’s about helping defenders justify the decisions they make. Scott Scher explains why cyber threat intelligence should be seen as cover, not an excuse. It should be seen as a way to prioritize and explain security actions with confidence. Scott lays out how CTI can give defenders clarity, accountability, and the ability to say.

Should I Use a Password Generator?

Weak passwords make it easy for hackers to access your accounts. A password generator creates strong, unique passwords that help keep your information safe. In this video, we’ll explain why you should use a password generator, the difference between passwords and passphrases and what to look for in a secure password generator.