Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Rubrik Brings Security at the Point of Data to Microsoft Azure Stack HCI

Operating in a cloud model means not only being able to access your data anywhere but that your infrastructure is flexible and scalable enough to accommodate demands that change from day to day or sometimes from moment to moment. This is easy enough to achieve in a public cloud, where resources can be made elastic and added and removed dynamically.

The 443 Episode 229 - Live Audience MSP Q&A Panel

On this week's very special episode of the podcast, we sit down with Matt Lee, Calvin Engen, and Scott Williamson, three MSP security and business experts for a Q&A panel in front of a live audience! We'll cover everything from how MSPs and MSSPs should address the cyber threat landscape to what vendors can do to be a more appealing partner. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Cryptography 101: Key Principles, Major Types, Use Cases & Algorithms

Cryptography is fundamental to many information security and privacy mechanisms. Today, a variety of cryptographic algorithms are used in many different applications. This article explains cryptography: how it works, key principles or operations of cryptography, types of cryptography, use cases and more! (This article was written by Shanika Wickramasinghe.

Social Engineering Attacks: The 4 Stage Lifecycle & Common Techniques

When it comes to high profile cybercrime incidents, it’s the major tech vulnerabilities and sophisticated state-sponsored threat vectors that make the headlines. In reality, however, most of the cybercrime incidents exploit the human element as the weakest link in the cyberattack kill chain.

Deconstructing Identity Security

Most companies now recognize the serious and insidious nature of cybersecurity threats. But many fail to grasp that the digital transformation, remote work, automation and cloud migration activities of the last few years have turbocharged the number of identities seeking access to data and critical business systems. This surge in identities has exponentially increased the likelihood of cyberattacks, undercutting the effectiveness of traditional identity and access management (IAM) paradigms.

Eliminate compromised passwords with One Identity Password Manager & Have I Been Pwned

It's a good question, and if you're curious about whether any of your email addresses or passwords were included in a data breach, you can easily find out at HaveIBeenPwned.com. This entirely free service, managed by Microsoft Regional Director & MVP Troy Hunt, lets you enter an email address or password to see how many breaches it has been included in.

Protecting Financial Data: Best Practices for External Attack Surface Management

The threat landscape in the financial services sector continues to get more menacing. Malicious actors and cybercrime groups increasingly set their sights on the sensitive financial data that banks, moneylenders, insurance companies, credit unions, and more all store in their IT environments. Exemplifying the challenge, one recent study found that the financial sector experienced the second-highest volume of data breaches in 2022.

How to - Disaster Recovery of a MineCraft Server on Red Hat OpenShift with Trilio

In this Video our Senior Solution Architect Rodolfo Casas is demonstrating how easy e.g. a MineCraft Server can be disaster recovered from one OpenShift Cluster to another. In this case we are talking about a DR scenario from ROSA (Red Hat OpenShift on AWS) to ARO (Azure Red Hat OpenShift Service)