Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Secrets Behind Magic Links: How They Work and Their Benefits

Can you imagine a world without passwords? There’s nothing more annoying than trying to access an account you haven’t used in a while, only to find out you’ve forgotten your password. As we need to verify our identities for almost everything, it is pretty easy to forget passwords to old accounts. This means you have to waste time remembering usernames, secret answers to questions, verifying, and creating and saving a new password.

Safeguarding Generative AI: How AI Guardrails Mitigate Key Risks

The growing reliance on generative AI is transforming industries across the globe. From automating tasks to improving decision-making, the potential of these systems is vast. However, with this progress comes significant risks. Generative AI can be unpredictable, creating new vulnerabilities that expose organizations to data privacy breaches, compliance failures, and other security issues. So, how can companies harness the power of AI while ensuring they remain protected?

Europe Threat Landscape Report

The Cyberint Europe Threat Landscape 2024-2025 report sheds light on the increasingly complex and evolving cyber threat environment affecting organizations across Europe and the UK. Leveraging data from Cyberint—which monitors threats like phishing, malware, and supply chain vulnerabilities—the report highlights a surge in malicious activities driven by global conflicts, technological shifts, and the growing use of generative AI in cybercrime.

Ask me Anything Webinar 004

Our Panel of CISOs In this interactive session, a panel of experienced CISOs—Frank D’Arrigo and Bob Chyka—answer pressing cybersecurity questions submitted by the audience. From threat management to security strategies, this session offers direct insights and expert advice from top industry leaders. Watch the recording to gain actionable guidance on protecting your organization, with practical advice on tackling today’s cybersecurity challenges.

The FortiManager RCE Vulnerability - The 443 Podcast - Episode 311

This week on the podcast, we review Fortinet's recently-disclosed remote code execution vulnerability in the FortiManager system that has been under active exploit since at least June. After that, we discuss the SEC's recent action against 4 companies found at fault for misleading security incident disclosure statements. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Lessons from the Cisco Data Breach-The Importance of Comprehensive API Security

In the wake of Cisco’s recent data breach involving exposed API tokens - amongst other sensitive information - the cybersecurity community is reminded once again of the significant risks associated with unsecured APIs. Though Cisco has asserted that the damage was limited to a public-facing environment, such breaches demand a more cautious evaluation. Exposing sensitive information like API tokens, credentials, and even source code can have broader security implications than initially apparent.

How to build resilience in critical systems

From power grids and water systems to transport networks and healthcare facilities, critical infrastructure has become a key target for cyber attacks in recent years, such as US utilities suffering a 70% year-on-year increase in cyber attacks this year. The reason for targeting critical infrastructure is clear: they often use outdated software and the attacks have an outsized disruptive impact.

How to Create a Data Loss Prevention Policy: A Step-by-Step Guide

With an average of more than 5 data breaches globally a day, it’s clear companies need a way to prevent data loss. This is where a data loss prevention policy comes into play. A data loss prevention policy serves as a crucial safeguard against unauthorized access, data breaches, and compliance violations. This comprehensive framework outlines strategies and procedures to identify, monitor, and protect valuable data assets across an organization’s network, endpoints, and cloud environments.

What is a Time-based One-time Password (TOTP)?

Authentication is the process that verifies the user's identity to control access to resources, prevent unauthorized users from gaining access to the system, and record user activities (to hold them accountable for their activities). It is used to authenticate users who log on to a server, ensure that software comes from a reputable source, and ensure that the person sending the message is who he says he is.