Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint Security

IT Executive: Do you know how to prevent exposed access to critical assets?

A vulnerability is a software code error that hackers can use to gain direct access to an IT system. "Exposure" is an incident in which a previously detected weakness has been taken advantage of by an unauthorized actor in the network. Recent research suggests that only 2% of all exposures give attackers seamless access to critical assets, while 75% of exposure incidents along attack paths lead to "dead ends," preventing cybercriminals from reaching sensitive information.

How to avoid burnout in your cybersecurity team?

While cyberattacks have been on the rise in recent years, one of the biggest threats to organizations’ cybersecurity is fatigue in the IT team, which leads to burnout syndrome. Gartner predicts that half of security managers will change jobs by 2025 due to industry-wide burnout. A recent study reveals that 66% of cybersecurity professionals in Europe claim to have experienced fatigue during 2022. In addition, 51% say they have worked more than four hours extra a week above their scheduled hours.

The 443 Episode 244 - Naming APTs

This week on the podcast, we cover Microsoft's latest refresh of naming conventions for advanced persistent threat (APT) actors worldwide, as well as an update on two specific threat actors and their latest tactics. We also cover a ransomware event targeting a biotechnology company with an interesting twist. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

How to protect yourself from a rainbow table attack with the help of MFA

Since 2013, World Password Day has been celebrated on the first Thursday of May and aims to foster better password habits. This event reminds us that passwords are the main guardians of our digital identities and that we must implement complex passwords such as passphrases capable of protecting us. In 2022 alone, 721.5 million exposed credentials were leaked online. As a result of these leaks, account takeover attacks (ATOs) are on the rise.

Here Come The Regulations 443 Podcast YouTube Short

This episode covers two new sets of cybersecurity regulations, fresh from the White House's National Cybersecurity Strategy publication, targeting different critical infrastructure sectors in the United States. We'll also cover the latest nation-state activity targeting network connectivity appliances and end with fun research into an oldie-but-goodie video game system.

An Update on Section 230 - The 443 Podcast - YouTube Short

In this week's episode, we look back to our initial monologue on Section 230 protections that allow social media and the Internet to function. We cap off the episode replay with a new discussion on a recent Supreme Court case that has the potential to dramatically impact the Internet as we know it.

Addressing the talent shortage with a unified security approach

The need for skilled cybersecurity personnel is having an impact on companies’ ability to stay secure. Despite the global cybersecurity workforce growing to 4.7 million in 2022, reaching record levels, according to data from the (ISC)2 2022 workforce study, there’s still a need for more than 3.4 million security professionals, an increase of 26% over 2021.

EPP vs EDR - What's The Difference?

With so many different endpoint security options available, it’s essential to understand the features and benefits of each solution before determining which best suits your organisation. The two main forms of advanced endpoint security, as categorised by Gartner, are Endpoint Protection Platforms (EPP) and Endpoint Detection and Response Solutions (EDR). In this blog post, we outline the key differences between the two, how they work and how to get the most out of them.

The 443 Episode 243 - TikTok is Banned, Kind Of

This week on the podcast, we cover the recent TikTok ban coming from the state of Montana and discuss whether it was justified and what the potential security impact is. Before that, we give an update on two US Supreme Court cases that were poised to potentially strip away Section 230 protections. We also highlight a new phishing-as-a-service (PaaS) platform that has yet again lowered the barrier for executing sophisticated attacks.

EP 239 MSPs Around the World Americas 443 Podcast YouTube Short

This week’s podcast comes from the WatchGuard Americas Apogee Partner Conference, where we bring on special guests Kevin Willette of Verus Corporation and Neil Holme of Impact Business Technology to discuss the challenges and opportunities MSPs and MSSPs will face in the coming years. This is the first of a multi-part series where we explore similar questions worldwide.