Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint Security

How to improve the cybersecurity of NGOs?

Digital transformation has reached all sectors, including non-governmental organizations (NGOs). These organizations have now become more dependent on technology to improve their ability to deliver and scale programs, engage with beneficiaries, and ensure an agile response to populations in need. Although this transformation delivers many benefits for NGOs, it has made them a viable and attractive target for cybercriminals.

Learnings from Discussing Identity Security with IDC

A few months ago, I had the pleasure of speaking with Jay Bretzmann, research vice president of security products at IDC. We discussed various security topics trending in 2023, including open identity standards, passwordless technologies like passkeys enabled by FIDO 2.0, and identity-first zero trust security strategies. It became clear that we had an opportunity to share these insights by turning our conversations into an Analyst Connection interview.

76% of vulnerabilities exploited in 2022 were up to 13 years old

Something as common and widely known as a software update can prevent major cyberattacks from happening, as they incorporate patches that fix system vulnerabilities. Prioritizing updates may seem a burdensome and inconvenient task for users, because computers and servers have to restart to perform installation, which interrupts users when they are working.

The 443 Episode 242 - An Interview with ChatGPT

This week on the podcast, Marc kick's Corey off the podcast and interview's ChatGPT to learn its thoughts on AI applications in cybersecurity, both on offense and defense. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

MFA phishing: the cyberattack that is compromising big company networks

Cybercriminals are well versed in the tactic of phishing, which aim to trick users into revealing confidential information and gain unauthorized access to user accounts and compromise corporate networks. A new type of phishing attack has now emerged, known as MFA phishing, which manages to evade the key protection measures deployed by corporate networks.

A taxonomy of endpoint security detection bypasses

I often see “EDR” used as a synonym for “industry-leading endpoint security solution.” There are times when this is accurate, but there are also times when I believe that this generalization stymies discourse around current capability gaps in the endpoint security ecosystem. In this blog post, I want to share my personal taxonomy for endpoint security products — albeit one that perhaps confusingly reuses existing terminology.

What is the difference between XDR and SIEM?

Over the past twenty years, security information and event management (SIEM) platforms have been one of the key solutions for cybersecurity management, as they help security teams centralize attack and threat detection activities. The cybersecurity industry is now shifting towards a new type of solution known as extended detection and response (XDR). As the two technologies are similar and have overlapping capabilities, many people still don’t know how they differ.