Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

The 443 Podcast - Episode 264 - Microsoft is Killing NTLM

This week on the podcast, we cover the recent HTTP/2 protocol vulnerability that lead to the largest DDoS attack ever recorded by CloudFlare. After that, we discuss Microsoft's announcement about the deprecation of VBScript and the impending removal of NTLM. We then cover a collection of data allegedly stolen from the genealogy website 23 and Me before ending with a fun bit of research targeting private servers for the Grand Theft Auto Online video game.

GitGuardian Can Update Pull RequestsWith GitHub Check Runs

Did you know that GitGuardian can add comments directly to your GitHub pull requests and even stop a PR from succeeding if it contains any hardcoded secrets? When a new pull request is created, a new check run is performed, and GitGuardian will scan through each commit inside the PR, not just the most recent one. If someone added a secret to an early commit, but then removed it right before making the PR, you still need to know it is present in the git history so you can address it.

Cyber Insurance Policy: How Many Is Enough?

In the world of cyber insurance, organizations face the challenge of securing sufficient coverage for their digital assets. With cyber threats on the rise, relying solely on a single insurance policy often falls short of what's needed. As a result, organizations find themselves reinsurance and stacking policies to bolster their protection. This video explores the intricate process of navigating the cyber insurance landscape, where companies seek to cover potential losses by obtaining multiple policies and strategically distributing risk among insurers.

Challenge of Cybersecurity Insurance Amid Ransomware Attacks

The issue at hand is a direct result of the significant ransomware attacks that have forced organizations to pay out millions. In response, insurance companies have adopted a seemingly superficial, tick-box approach to cybersecurity assessments. Although they are attempting to enhance their due diligence, they fall short in truly evaluating security measures. Instead of thorough testing and on-site inspections, insurance companies rely on organizations to truthfully disclose their cybersecurity measures.