Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

The 443 Episode 226 - Report Roundup

This week on the podcast, we cover key findings from three individual reports published last week. In the first report we'll dive into the world of blockchain analysis looking for illicit transactions. In the second report, we'll cover the state of SMB security. The final report includes a discussion of overall financial crime involving stolen payment card information. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

AI and Cybersecurity: Some observational implications of the intersection between the two

There is a possibility that artificial intelligence (AI) will have a significant influence, in either a good or bad direction, on cybersecurity. On the plus side, artificial intelligence (AI) can be used to automate and improve many parts of cybersecurity. AI can find and stop threats, find strange behavior, and look at network traffic, among other things. This might be a game-changer for the industry.

Automating Kubernetes Backups with CloudCasa REST APIs

For power users who want to run their scripts from the command line or use workflow automation tools to provision their environments, watch this short tutorial on how to use the CloudCasa REST API to manage Kubernetes backups. The tutorial goes through an example of executing a CloudCasa backup job through the REST API, which requires tasks such as querying for backup job ids and invoking an action against that job through an http request.

The Ethical Hacking Guide: Hacking for Security

Companies are under more threat than ever. The rise in cyber threats is alarming: 2021 saw a 30% increase in cyberattacks compared with 2020. Even sophisticated systems with complex countermeasure technologies for security may be vulnerable to attack. Many organizations turn to hackers to counteract these threats. Ethical hackers use the tools and methods of malicious actors to help companies pinpoint their weaknesses and build a more resilient and secure system.

Shift Left Security: How To Shift Security Left for Software Development

For a long time, security and development were two distinct aspects of programming. As organizations started to leverage software and technology as differentiating factors, the speed and quality of development became more important than ever. Organizations no longer had time after development was complete to address security vulnerabilities. Catching vulnerabilities too late opens companies up to unnecessary risk and can be costly to fix.

Leveraging Your Data to Drive Business Outcomes and Improve Cyber Resilience

It was another eventful year for security professionals in 2022. The year began on the tail of the Log4j vulnerability, data breaches were on the rise, and ransomware attacks were as prevalent as ever. So it’s safe to say cyber resilience is required to be at the forefront for public sector leaders.

[Webinar] How You Should Not Remediate Your Hardcoded Secrets

If you have ever run a secrets scanner against your entire codebase, it has likely raised hundreds if not thousands of findings, leaving you wondering, "Where should I start?" Unlike other vulnerabilities, hardcoded secrets represent a threat by themselves whether your code is running or not. Attackers with access to a repository will scan it inside out for secrets, turning every occurrence into a risk you cannot ignore. Still, this does not mean that you should treat all incidents equally!

How do you perform quarterly access reviews?

Savvy organizations usually deploy some type of identity and access management (IAM) solution. IAM solutions leverage the principle of least privilege (POLP), role-based access control (RBAC), or other such mechanisms to manage access to data, applications, and IT infrastructure. ‍ However, every organization's structure and human resources capacity typically change over time as new employees are brought on board and existing ones quit.

Quanta Services Protects Privilege In Over 200 Subsidiaries | CyberArk

Quanta is a specialized contracting services company that delivers comprehensive infrastructure solutions for the utility, renewable energy, communications, pipeline, and energy industries. Founded in 1997 when four companies merged, Quanta has grown to become a $12 billion organization. See how CyberArk helped them enhance their security and reduce demand on IT teams.