Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Nevada's Ransomware Wake-Up Call: The Case for Privileged Access Management

The Governor’s Technology Office (GTO) of the State of Nevada recently released an “After Action Report” on the statewide ransomware attack that disrupted state systems for nearly one month in August 2025. The report details not only what happened but also the coordinated incident response from the GTO, vendors and law enforcement partners from local, state and federal agencies.

Comparing Best NER Models for PII Identification

Identifying and redacting personally identifiable information (PII) is a critical need for enterprises handling sensitive data. Over 1000 NLP models and tools claim to solve this problem, but an infinite number of options opens a paradox of choice. We compiled this comprehensive comparison that examines notable PII detection solutions – their features, use cases, pros/cons, and reported success rates.

Hacked Architecture, Not Code: What is a Business Logic Attack? #businesslogic #cybersecurity

Why do hackers ignore your firewalls and clean code? Because they exploit your business logic and application architecture. A Business Logic Attack (BLA) is a sophisticated manipulation that uses your own system's design against you. Learn the key difference between code flaws and architectural exploits.

Acronis SIEM Connector 2.0: Seamless Security Integration for MSPs

MSPs often rely on managed detection and response (MDR) integrations, which provides enterprise-grade security capabilities without the need for in-house analysts or complex infrastructure. As MSPs grow into medium-sized businesses, they typically expand into extended detection and response (XDR) integrations, giving greater visibility across multiple security layers (endpoints, networks and cloud) and more control over how they manage and respond to threats.

Jump Gate - Tanium Tech Talks #150

Customers are raving about Tanium's new remote access management solution! See a demo on today's Tanium Tech Talk. Secure shell access management for and Reduce exposure by eliminating standing privileges Create & prioritize access policies Submit requests for approval with notifications via Guide, Slack, Teams Audit activity and session logs RBAC support for auditor, user, administrator Simple setup with no additional ports to open.

HuntIQ - Tanium Tech Talks #149

Expert-led threat hunting… ️ Imagine getting golf lessons from Tiger Woods, hacking lessons from Kevin Mitnick, or gaming lessons from Valkyrae. Ok. They are the GOATs. Really good. But what about? If only someone could ride along with me, enhance my skills, and teach me how to fish (not phish). That's kinda what Tanium HuntIQ is about. Imagine threat hunting with a pro, as they teach you how to use and customize tools for your environment. Oh, and results. They help you deliver at a new level. And they do this with you for a year. That's career gold.

Endpoint Management for Operational Technology - Tanium Tech Talks #148

Tanium Endpoint Management for Operational Technology… "OT" Today see how Tanium now offers visibility for OT and ICS devices in manufacturing and industrial environments. Tanium full stack visibility at speed and scale on the OT shop floor Using native device protocols from a Tanium client satellite Query & report on devices & vulnerabilities using a familiar Tanium experience IT & OT global visibility converged into a single solution.

2025 Security Predictions Recap - The 443 Podcast - Episode 349

This week on the podcast, we review our 2025 security predictions and grade ourselves on our accuracy. We recap all 6 predictions for 2025 from multi-modal AI being used to create entire attack chains to the CISO role becoming the least desirable role in business, and follow up on this year's news to see if they hit or not.