Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Microsoft's Anatomy of a modern attack surface: A breakdown

In today’s hyper-connected digital landscape, cyber security has grown increasingly complex. Organisations are shifting operations to the cloud, enabling remote work, and engaging with third-party ecosystems, expanding the potential attack surfaces. Threat actors are exploiting this complexity with high-volume, multi-faceted attacks.

The 443 Podcast - Episode 264 - Microsoft is Killing NTLM

This week on the podcast, we cover the recent HTTP/2 protocol vulnerability that lead to the largest DDoS attack ever recorded by CloudFlare. After that, we discuss Microsoft's announcement about the deprecation of VBScript and the impending removal of NTLM. We then cover a collection of data allegedly stolen from the genealogy website 23 and Me before ending with a fun bit of research targeting private servers for the Grand Theft Auto Online video game.

Strengthening Cybersecurity: Force multiplication and security efficiency

In the ever-evolving landscape of cybersecurity, the battle between defenders and attackers has historically been marked by an asymmetrical relationship. Within the cybersecurity realm, asymmetry has characterized the relationship between those safeguarding digital assets and those seeking to exploit vulnerabilities.

Mastering Technical Certifications with Training from WatchGuard

Earning or renewing a technical certification with WatchGuard empowers you to enhance your expertise and stay up to date with the latest advancements in our products. WatchGuard offers exams that cover the spectrum of essential skills related to WatchGuard solutions. Combining hands-on experience with these certification exams can substantially help you provide the best possible security to your customers in an efficient and scalable way.

Unlocking The Power of Zero with Netskope and Okta

We need to shift how we as security practitioners break the barriers for collective threat awareness across identity touchpoints within cybersecurity. It’s become imperative that we gain the ability to continuously assess user risk with automatic response actions—a shift towards a unified, contextually-driven identity defense.

Your Sender Policy Framework (SPF) Risk Exposure

The Sender Policy Framework (SPF) is an email authentication protocol that specifies email authorization through Domain Name System (DNS) records. When an email is sent through the Simple Mail Transfer Protocol (SMTP), there is no requirement for authorized messages, which means that spammers can forge your domain in their phishing attacks.

How to Transition to a Fully Passwordless Environment With Keeper, Passkeys and SSO

Passwordless authentication is a security method that allows a user to gain access to a system without entering a traditional password. Instead, it relies on alternative means of verification, such as biometric data (like fingerprints or facial recognition), hardware tokens or one-time codes sent to a trusted device.

GitGuardian Can Update Pull RequestsWith GitHub Check Runs

Did you know that GitGuardian can add comments directly to your GitHub pull requests and even stop a PR from succeeding if it contains any hardcoded secrets? When a new pull request is created, a new check run is performed, and GitGuardian will scan through each commit inside the PR, not just the most recent one. If someone added a secret to an early commit, but then removed it right before making the PR, you still need to know it is present in the git history so you can address it.