Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The 443 Podcast - Episode 263 - Q2 2023 Internet Security Report

This week on the podcast, we go through the latest Internet Security Report from the WatchGuard Threat Lab. We'll cover the top malware and network attack trends from Q2 2023 impacting small and mid-market organization globally before ending with defensive tips anyone can take back to their company. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Building a Cyber-Resilient Future Together

Last week in New York, I had the opportunity to attend a panel discussion hosted by SINET and moderated by Upendra Mardikar, the Chief Information Security Officer of TIAA. We discussed everything from security in DevOps, to AI’s pros and cons, and cybersecurity’s future. As long as the attack surface, API usage, and digital footprints increase, so will cyber risk.

Hack the Building 2.0 Hospital - Training New Cybersecurity Talent

This year for the 13th year in a row, the healthcare industry continues to experience the most expensive data breaches worldwide, at an average cost of nearly $11 million – double the cost for the next-highest industry, finance. That’s not surprising; ransomware attacks on hospitals and health systems are constantly in the news. Add to that the cybersecurity talent shortage, which is especially acute (pardon the pun) in the healthcare industry.

From Scan to Strategy: Balancing Vulnerability Assessments with Penetration Testing in Cybersecurity

In the realm of cybersecurity, there's a common analogy that likens the process to a health checkup. Vulnerability scanning, in this context, can be seen as a basic health screening. It's a preliminary step, offering a snapshot of potential issues within a system. It's like getting your blood pressure or cholesterol checked during a routine visit to the doctor. These tests are essential, providing a quick overview of potential health concerns. But they don't give the full picture.

Automatic Application Protection using Red Hat Advanced Cluster Management with Trilio (with Audio)

(With Audio) See how easy it is to protect a newly deployed application into OpenShift using Red Hat Ansible Automation Platform, followed by an ACM Policy written for Trilio that will auto protect the deployed application (create a backup, according to the policy) In this video we will show you an example of using Red Hat Advanced Cluster Management (or ACM) and Trilio to automatically back up an application that has just been deployed.

Restore your OpenShift Virtualization VMs with Trilio (With Audio)

Use the Trilio UI to Restore your OpenShift Virtualization Virtual Machines. In this video we will show you how to restore a previously backed up virtual machine running in OpenShift using Trilio As we are restoring a virtual machine to the same cluster that we backed up earlier, we can use the Trilio User Interface to simply list the deployed virtual machines, and see that the status of the last backup is marked as Available for this virtual machine.

Backup your OpenShift Virtualization VMs with Trilio (With Audio)

Use the Trilio UI to Backup your OpenShift Virtualization Virtual Machines. In this video we will show you how to backup individual virtual machines from OpenShift using Trilio. First we are going to log in to the Trilio User Interface using our OpenShift credentials. Trilio has a Backup Wizard that allows you to select your individual VMs that you have access to in your cluster. We’ll select this Virtual Machine and click Next.