Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

You Wouldn't Download a Shipment - The 443 Podcast - Episode 369

This week on the podcast, we discuss a recent warning from the FBI about hacking leading to stolen shipments. Before that, we cover the Vercel software supply chain incident before discussing the Vect Ransomware-as-a-service turned accidental wiper.

World Password Day 2026: Lock Down Your Enterprise

“Passwords are like underwear. You should change them often, and you shouldn’t share them with strangers.” This old adage, often attributed to information security expert Chris Pirillo, has been a cornerstone of cybersecurity advice for decades. As we approach World Password Day 2026, that advice feels more relevant than ever for IT professionals tasked with securing entire organizations.

The Force Awakens Your Attack Surface

May the 4th be with you. In celebration of Star Wars Day, here's what a galaxy far, far away can teach us about security. The films work surprisingly well as a case study, and not in the obvious way. It's not the lasers, androids or the lightsabers. It's that the Empire and the First Order both fall into the same trap most security programs walk into every day. In this post, we'll walk through what the films get right about modern security challenges, how AI is making them worse, and what to do about it.

8 in 10 companies are betting on AI agents-but fewer than half have a policy to govern them

Accelerating security solutions for small businesses‍ Tagore offers strategic services to small businesses. A partnership that can scale‍ Tagore prioritized finding a managed compliance partner with an established product, dedicated support team, and rapid release rate. Standing out from competitors‍ Tagore's partnership with Vanta enhances its strategic focus and deepens client value, creating differentiation in a competitive market.

Three AI Blind Spots Your Security Team Can't Afford to Miss

AI governance is not a policy problem. It’s a visibility problem. Most enterprises are approaching it from the outside in: writing acceptable use policies, issuing guidelines, and hoping employees comply. That approach fails because it operates on assumption rather than evidence. You cannot enforce what you cannot see and most organizations have no reliable way to see what AI tools are actually running inside their environment.

How to Deploy DSPM Across Multiple Cloud Environments

Most enterprises are not running on a single cloud. The vast majority of organizations now operate in hybrid or multi-cloud environments and sensitive data follows wherever workloads go. Regulated files end up in S3 buckets. PII lands in BigQuery development tables. Source code copies into Azure Data Lake repositories that no policy anticipated. The problem is not that organizations chose to spread data across clouds. The problem is that most security programs were not built to track it.

Detection, endpoint isolation, and ticketing with one AI prompt

Most current demonstrations of AI in security operations are lackluster. You ask a chat interface a question, get a summary, and maybe a suggested next step. The operator still does all the work, at human speed. Meanwhile, adversaries are already deploying AI offensively against their targets. AI in SecOps must ultimately be an operator. Otherwise, the gap between adversary and defender will become too wide to bridge. LimaCharlie Co-founder, Christopher Luft, demonstrates a simple way to get started.

GPT-5.5 vs Claude Opus 4.7: I Made Both Build an App - Here's What Happened

GPT-5.5 vs Claude Opus 4.7 - two flagship AI models dropped one week apart, and both claim to be the best at agentic coding. We put that to the test by giving each model the exact same prompt: build a production-ready, secure note-taking application from scratch. But we didn't stop at reviewing the code. We actually tried to break it by running real security tests against each app to see whether AI-generated code can be trusted with user data. The results were not what we expected.

This Month in Datadog - April 2026

In the latest episode of This Month in Datadog, Jeremy shares how to run autonomous Cloud SIEM investigations, remediate vulnerabilities with auto-generated fixes, and use natural language to explore Datadog. Later, Sumedha Mehta spotlights the Datadog MCP Server, which gives AI agents real-time access to Datadog’s observability data. Then, Chetan Sharma walks through Datadog Experiments, which measures how product changes impact the user journey.