Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Anonymization: Safeguarding Sensitive Information - Permanently

What is anonymization? InfoSec teams can utilize anonymization to irreversibly scramble sensitive data values, thereby protecting an individual’s private information. If the sensitive information can no longer be linked to an individual, businesses have a better chance of saving on audits, complying with regulatory requirements, and scaling their ability to compete – all leading to revenue increases for your bottom line.

Demo Tuesday

How can federal agencies possibly comply with the HUNDREDS of complex specifications in the DISA STIG compliance checklists? Join Mike Lossmann and Federal Technical Solutions Engineer Sean Deveci for this week’s Demo Tuesday to learn how a network digital twin can streamline your federal network compliance and give you full confidence heading into an audit.

Tokenization: Replacing Data Values One Token at a Time

What is tokenization? This method revolutionized the modern way we protect data. In today’s age, InfoSec teams can deploy keyless and reversible methods with tokens, which replace sensitive Personal Identifiable Information (PII) and store this information in both vaulted and vaultess token look-up tables. When the data is needed, it can be re-identified and accessed by the right parties, ensuring sensitive information remains protected. Watch above to learn more about this revolutionary data protection method.

Pseudonymization: Replacing Sensitive PII Values to Better Protect Your Data

What is pseudonymization? It’s one of many data protection methods that allow businesses to improve their sensitive data protection across systems by replacing values with pseudonyms. Learn more about this crucial data protection method and learn more about utilizing this method to boost your business’s cyber security posture.

Data De-Identification: The Foundation of Data Protection

De-identifying data is what every data protection method is designed to do, making it the basis of effective cybersecurity. Common data fields that are de-identified by businesses would include names, birth dates, addresses and zip codes, National ID, and Social Security Numbers. By obfuscating sensitive data values through reversible and irreversible methods, your customers and patients can rest easy knowing their data can only be viewed by authorized parties.

Indusface WAS URL Verification - HTML File Upload Method

Verifying the ownership of your URL is crucial when adding a new website to Indusface WAS. In order to conduct a vulnerability scan on your website or app, confirming ownership of the site or domain is essential to prevent unauthorized access. For URL Verification on Indusface WAS, you can use any of the below methods: Learn how to verify your URL ownership using the HTML File Upload method in this method.

The 443 Podcast - Episode 274 - RIPE for the Taking

This week, we cover a password compromise that lead to a mobile telco in Spain losing control of their IP address space. We also give a quick update on the Lapsus$ ringleader's court case before discussing a recently discovered macOS backdoor malware that evades most endpoint protection. We end the episode by covering Microsoft's research into a malware installation method that bypasses many security protections.