Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Are Passwords Really Dead in 2025?

Our latest discussion tackles persistent challenges in cybersecurity, specifically focusing on identity and access management (IAM). Experts highlight how attackers are now logging in rather than breaking in, underscoring the critical need for robust password encryption policies. This shift puts a spotlight on effective data protection and online security measures to safeguard against evolving threats.

Solving Al Agent Sprawl: API Governance Across Multi Gateway Environments

As organizations accelerate adoption of AI agents, autonomous workflows powered by LLMs and MCP servers are rapidly proliferating across internal systems, partner networks, cloud environments, and API gateways. The result? A sprawling, often invisible attack surface: shadow APIs, duplicate endpoints, context drift, unmanaged agent access, inconsistent policies, and risk of data exposure or compliance failures.

OWASP Top 10 2025 Edition - The 443 Podcast - Episode 350

This week on the podcast, we cover OWASP’s update to the top 10 web application security weaknesses and its changes from the 2021 list. We also cover a recently uncovered adversary-in-the-middle campaign that’s pushing malicious software updates to targeted systems. We conclude with our opinions on Microsoft’s latest AI features, which are coming to Windows.

Why User Consent Is Revolutionizing LLM Privacy Practices

Ask most people what “consent” means and you’ll hear about a banner that asks to collect cookies. That was yesterday. Modern LLMs ingest emails, tickets, docs, chats, and logs. They create embeddings, reference snippets with retrieval, and sometimes fine-tune on past conversations. If you do not wire user consent into each of those steps, you either violate laws, lose user trust, or both. That is why user consent is revolutionizing LLM privacy practices.

Get better visibility for the WAF with payload logging

As the surface area for attacks on the web increases, Cloudflare’s Web Application Firewall (WAF) provides a myriad of solutions to mitigate these attacks. This is great for our customers, but the cardinality in the workloads of the millions of requests we service means that generating false positives is inevitable. This means that the default configuration we have for our customers has to be fine-tuned.

Top 5 Cyber Security Trends for 2026: Navigating the Shift from Prevention to AI Testing

The world of cyber security is on the cusp of a fundamental transformation. For decades, the primary security model has been one of prevention building higher walls and stronger gates to keep adversaries out. But as we look toward 2026, this fortress mentality is proving insufficient.

The Efficiency Shift: How AI Turns Noise into Clarity

Artificial intelligence (AI) is everywhere in cybersecurity marketing. Real AI is not about detecting more. It is about making decisions faster and more precisely, so that humans can spend their time on what truly matters. Endpoint security efficiency is the ability to deliver maximum protection with minimum operational effort, turning noise into clarity and alerts into meaningful incidents. AI is the engine that makes this possible.

Understanding the Fundamentals

Docker and OpenShift solve different problems in containerization. Docker creates and runs containers, while OpenShift manages container deployments at enterprise scale using Kubernetes underneath it. Docker vs. Openshift isn’t about choosing one over the other but rather understanding which tool fits your specific use case. Docker excels at application packaging and local development. OpenShift handles production orchestration, security policies, and multi-team environments.

Top Security Insights You Need to Know from Microsoft Ignite 2025

Microsoft Ignite 2025 delivered big news for security professionals. The theme this year is clear: Microsoft is giving customers more capability inside the tools they already own, focused on AI agents and integrations. Whether you are a small IT team, a mid-market group, or a global enterprise, these updates can transform your security posture.