Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Partner Perspectives | Computacenter on Tanium and Autonomous Endpoint Management

Chris McMahon, Security Practice Lead at Computacenter, shares what excites him about Tanium's vision for Autonomous Endpoint Management (AEM). Hear his insights on how AEM will enable him to focus on the hard problems while decreasing manual efforts to fix common issues.

Verizon DBIR Breakdown - The 443 Podcast, Ep. 289

📽️ 🔊 This week on #the443podcast, Corey Nachreiner and Marc Laliberte cover the key takeaways from the 2024 Verizon Data Breach Investigations Report. Before that, they discuss what we learned from United Healthcare CEO Andrew Witty’s congressional testimony on their ransomware attack in February. Corey and Marc end with a discussion on a research article from JFrog on malicious Docker Hub repositories.

What you need to do to elevate your data protection

Data theft is a growing concern for companies and users alike. More and more attacks are being launched with the aim of gaining access to third-party data, and the number of people affected is on the rise. The unease organizations are experiencing over these threats is backed by the statistics. According to one report, 422 million people were victims of data theft in 2022.

The 443 Podcast - Episode 289 - The 2024 Verizon DBIR

This week on the podcast, we cover the key takeaways from the 2024 Verizon Data Breach Investigations Report. Before that, we discuss what we learned from United Healthcare CEO Andrew Witty's congressional testimony on their ransomware attack in February. We also discuss a research article from JFrog on malicious Docker Hub repositories. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Malware-as-a-Service (MaaS): How to protect your customers

The cyberthreat landscape is in a state of constant evolution. As the digital dependency of businesses grows, so do the opportunities for those looking to take advantage of it. In recent years, we have witnessed an upsurge in a new type of malicious actor: the non-technical cybercriminal.