Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The 443 Episode 229 - Live Audience MSP Q&A Panel

On this week's very special episode of the podcast, we sit down with Matt Lee, Calvin Engen, and Scott Williamson, three MSP security and business experts for a Q&A panel in front of a live audience! We'll cover everything from how MSPs and MSSPs should address the cyber threat landscape to what vendors can do to be a more appealing partner. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Cryptography 101: Key Principles, Major Types, Use Cases & Algorithms

Cryptography is fundamental to many information security and privacy mechanisms. Today, a variety of cryptographic algorithms are used in many different applications. This article explains cryptography: how it works, key principles or operations of cryptography, types of cryptography, use cases and more! (This article was written by Shanika Wickramasinghe.

Social Engineering Attacks: The 4 Stage Lifecycle & Common Techniques

When it comes to high profile cybercrime incidents, it’s the major tech vulnerabilities and sophisticated state-sponsored threat vectors that make the headlines. In reality, however, most of the cybercrime incidents exploit the human element as the weakest link in the cyberattack kill chain.

Deconstructing Identity Security

Most companies now recognize the serious and insidious nature of cybersecurity threats. But many fail to grasp that the digital transformation, remote work, automation and cloud migration activities of the last few years have turbocharged the number of identities seeking access to data and critical business systems. This surge in identities has exponentially increased the likelihood of cyberattacks, undercutting the effectiveness of traditional identity and access management (IAM) paradigms.

Eliminate compromised passwords with One Identity Password Manager & Have I Been Pwned

It's a good question, and if you're curious about whether any of your email addresses or passwords were included in a data breach, you can easily find out at HaveIBeenPwned.com. This entirely free service, managed by Microsoft Regional Director & MVP Troy Hunt, lets you enter an email address or password to see how many breaches it has been included in.

Protecting Financial Data: Best Practices for External Attack Surface Management

The threat landscape in the financial services sector continues to get more menacing. Malicious actors and cybercrime groups increasingly set their sights on the sensitive financial data that banks, moneylenders, insurance companies, credit unions, and more all store in their IT environments. Exemplifying the challenge, one recent study found that the financial sector experienced the second-highest volume of data breaches in 2022.

How to - Disaster Recovery of a MineCraft Server on Red Hat OpenShift with Trilio

In this Video our Senior Solution Architect Rodolfo Casas is demonstrating how easy e.g. a MineCraft Server can be disaster recovered from one OpenShift Cluster to another. In this case we are talking about a DR scenario from ROSA (Red Hat OpenShift on AWS) to ARO (Azure Red Hat OpenShift Service)