Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Jump Gate - Tanium Tech Talks #150

Customers are raving about Tanium's new remote access management solution! See a demo on today's Tanium Tech Talk. Secure shell access management for and Reduce exposure by eliminating standing privileges Create & prioritize access policies Submit requests for approval with notifications via Guide, Slack, Teams Audit activity and session logs RBAC support for auditor, user, administrator Simple setup with no additional ports to open.

HuntIQ - Tanium Tech Talks #149

Expert-led threat hunting… ️ Imagine getting golf lessons from Tiger Woods, hacking lessons from Kevin Mitnick, or gaming lessons from Valkyrae. Ok. They are the GOATs. Really good. But what about? If only someone could ride along with me, enhance my skills, and teach me how to fish (not phish). That's kinda what Tanium HuntIQ is about. Imagine threat hunting with a pro, as they teach you how to use and customize tools for your environment. Oh, and results. They help you deliver at a new level. And they do this with you for a year. That's career gold.

Endpoint Management for Operational Technology - Tanium Tech Talks #148

Tanium Endpoint Management for Operational Technology… "OT" Today see how Tanium now offers visibility for OT and ICS devices in manufacturing and industrial environments. Tanium full stack visibility at speed and scale on the OT shop floor Using native device protocols from a Tanium client satellite Query & report on devices & vulnerabilities using a familiar Tanium experience IT & OT global visibility converged into a single solution.

2025 Security Predictions Recap - The 443 Podcast - Episode 349

This week on the podcast, we review our 2025 security predictions and grade ourselves on our accuracy. We recap all 6 predictions for 2025 from multi-modal AI being used to create entire attack chains to the CISO role becoming the least desirable role in business, and follow up on this year's news to see if they hit or not.

How to Prevent Account Takeovers from SEO Poisoning and Fake Search Ads

SEO poisoning has become a major driver of phishing‑driven credential theft. Attackers manipulate search engine results and paid ads so users click on what appears to be a legitimate brand link, only to land on a fake website built to steal login credentials. Attackers combine domain abuse, cloaking, and keyword hijacking to move malicious pages to the top of search results.

CVSS Is a Little Bit of Risk: Rethinking CVSS in Vulnerability Prioritization

The best part about my job is that I sometimes get to make some controversial statements. Well, as controversial as things can be in a niche area of cybersecurity like “what is a reasonable measure of vulnerability risk?” Along with my colleague Sander Vinberg we got to explore this question earlier this year at the second Annual VulnCon conference in Raleigh. Even though it’s only been held twice, it is quickly becoming one of my favorite conferences.

Hybrid Workforce Security and Dark Web Monitoring

Remember the early days of remote work? We traded our cubicles for kitchen tables and suddenly, our homes became our headquarters. This shift to the Hybrid Workforce has been incredible for flexibility, but let’s be honest: it tossed the old corporate security playbook out the window. The old way was easy: a big firewall at the office door, and you were safe. Now, that “door” is every employee’s home router, every personal laptop, and every late-night click when fatigue sets in.

Boost your cyber defense with unified cybersecurity and GRC strategies

Cybersecurity is no longer just an IT issue; it is a strategic imperative that touches every aspect of modern business. In today’s digital landscape, organizations face increasingly sophisticated threats that can disrupt operations, tarnish reputations, and lead to significant financial losses. A unified approach that integrates cybersecurity with governance, risk management, and compliance (GRC) strategies is the key to building robust defenses.

Master how to report a breach for fast and effective cyber incident response

For every organization, no matter the size or industry, the integrity and security of data is more crucial than ever as it faces the possibility of a cyber breach everyday. But what separates a company that bounces back quickly from one that suffers irreparable damage? The answer largely resides in how promptly and accurately the breach is reported and how it is handled thereafter.