Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The 443 Podcast - Episode 302 - Hacker Summer Camp 2024 Recap

This week on the podcast, we round out our takeaways from the Black Hat and Def Con security conferences in Las Vegas. We go through 4 talks across both conferences that were especially interesting either for nostalgia or modern impact. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Supercharge domain discovery with AI-powered External Attack Surface Management (EASM)

Modern organizations have sprawling attacks surfaces of known and unknown assets that grow each day. This means understanding and managing your external attack surface is more crucial than ever. But with the vast number of digital assets that organizations need to monitor, accurately identifying every component of your attack surface can seem overwhelming – which is why many turn to External Attack Surface Management (EASM).

How to Migrate VMware ESXi VMs to Proxmox VE: A Step-by-Step Guide

To migrate virtual machines from VMware ESXi to Proxmox VE, you should have a network connection between the source ESXi host and the destination Proxmox host. The main part of VM migration is transferring virtual disk data. Learn how to migrate VMs to Proxmox with two main methods and detailed instructions. Watch the video to learn two methods for seamless migration between the two environments.

Scams: Understanding vulnerabilities and protective strategies

Many people don’t realize that scams are complicated events orchestrated by scammers, which often include myriad persuasive techniques and take advantage of our individual characteristics and circumstances. While each scam varies in complexity, they typically progress through three broad stages, each influenced by factors that either heighten or diminish our vulnerability to becoming victims.

The Psychological Tactics Behind Email Scams

This blog looks at the intersection of psychology and email attacks to help guard your business against elaborate deception and adopt actionable strategies to defend your people and assets from manipulative schemes. After reading it, you’ll be better prepared to thwart scams and bolster your organization’s resilience against email-based threats.

Why DCAP is Essential for Modern Data Security (A Closer Look)

Almost every company has a system for organizing file storage, which employees use regularly. Streamlining data storage in a corporate environment is not just about improving business processes; it is also about ensuring security. It is challenging to protect data if you do not know where it is stored, what it contains, its value, who owns it, who has access to it, and what its most significant threats are. This is where Data-Centric Audit and Protection (DCAP) systems come into play.

What is a Cyber Advisor?

Certifications are a great way for customers to get confidence that the company they’re trusting with their cyber security is up to the job. So, when the Cyber Advisor scheme was launched, we thought it was a great opportunity to invest in our staff. In this Q&A blog we’ll look at what a Cyber Advisor is, what it means for your business, and what it means to our staff – as we talk to Bulletproof’s first Cyber Advisor, Jemma Aldridge.