Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security People Can be more Strict #cybersecurity #appsec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Is Zero Trust a Total Bust? - The 443 Podcast - Episode 339

This week on the podcast, we discuss key findings from a DefCon presentation from researchers at AmberWolf titled ZeroTrust, Total Bust and what it means for Zero Trust Network Access. After that, we review a new vulnerability in the FortiWeb WAF before ending with a quick update from Google Project Zero on a new vulnerability disclosure policy. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Why CTI Must Recommend, Not Just Report

In traditional intel roles, analysts avoid making direct recommendations. But Scott Scher explains why that doesn’t work in the business world. CTI teams can’t just present options, they need to say what should happen next. Scott breaks down why effective CTI must go beyond context and offer clear, actionable guidance for defenders. Hidden Truths: Traditional intel avoids giving direct recommendations Business leaders and defenders want clear next steps CTI teams must say.

Defending Against WAF, API, and DDoS Attacks

Defending Against WAF, API, and DDoS Attacks In this SourceForge video, Carlo Alpuerto of A10 Networks shares insights on how ThreatX protects WAF, API, DDoS, and bot attacks, processing all the information within a single database. Alpuerto highlights the platform's ability to apply these protections and actionability, showcasing how users can create and manage specific rules. He also notes that the ThreatX security operations center (SOC) team curates these rules daily, utilizing threat intelligence, CVE notifications, and zero-day news to provide comprehensive, up-to-date protection.