Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Boosting Organizational Cyber Defense with the Tanium Connectors for OpenCTI and OpenBAS by Filigran

As part of Tanium’s ongoing partnership with Filigran, provider of open-source cybersecurity solutions, the new Tanium Connector for OpenBAS with the existing Tanium Connector for OpenCTI will help organizations more quickly identify and remediate cyber threats.

KeyScaler 2025: How AI IoT Security Protects Unmanaged Devices

In today’s hyper-connected world, unmanaged IoT devices represent one of the fastest-growing security threats. Research shows that over 50% of IoT devices contain critical vulnerabilities, and one-third of all data breaches now involve an IoT endpoint. Data privacy is a major concern in IoT security, as protecting sensitive information and ensuring confidentiality is essential to prevent attacks and unauthorized access.

AI Regulations and Frameworks: Preparing for Compliance and Resilience

‍Artificial intelligence (AI) has departed from the realm of science fiction and emerged as a very real, regular part of life, increasing efficiency across a number of everyday activities. Particularly in the marketplace, where process optimization directly equates to time and money, general-purpose AI (GenAI) and other AI systems have rapidly taken on a central role.

From Firewalls to AI: Understanding the Evolution of Cybersecurity

From Firewalls to AI: Understanding the Evolution of Cybersecurity The history of IT security has always been a journey of adapting to new threats. It started with simple firewalls to protect the "front door" and evolved to include endpoint, database, and Docker security. But what happens when the very intelligence you're building becomes a new kind of front door—and a new attack surface?

Building a Smarter Incident Response Playbook with Deception and Fidelis Elevate

Cybersecurity has become unnecessarily complex. Modern threat actors have refined network infiltration techniques while many organizations continue operating with outdated response methodologies. Traditional security measures are proving insufficient against contemporary attack vectors, particularly advanced persistent threats that operate undetected for extended periods. Security operations centers process thousands of daily alerts, with most representing false positives.

Does Security Training Work? - The 443 Podcast - Episode 342

This week on the podcast, we discuss a recently published research study from UC San Diego on the effectiveness on security awareness training on phishing prevention. After that, we discuss a security researcher's work on identifying vulnerabilities in four separate employee webapps at Intel. Finally, we end with our analysis of a Ponemon Institute research report called The State of File Security.