Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The 443 Episode 221 - Apple's New Privacy Expansion

This week on the podcast, we cover Apple's latest announcement of expanded privacy and security features for their users. Before that, we cover a major breach in the Android ecosystem followed by a new Internet Explorer (yes, that still exists) 0-day vulnerability. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

GitGuardian Playbooks Overview

GitGuardian Playbooks allow you to quickly and easily automate your incident responses. GitGuardian is proud to offer 3 different playbooks designed to get your team involved in remediating incidents: We would be happy to work with you to create custom playbooks as well. Don't hesitate to reach out to us at contact@gitguardian.com.

Introducing Third-Party Vulnerability Detection

Learn how Bitsight Third-Party Vulnerability Detection empowers third-party risk professionals to find and remediate threats - including major security events - more quickly within their vendor portfolio. Identify exposure and mitigate risk more easily with critical insights into the impact on your organization’s third parties.

BitSight for Fourth Party Risk Management

Learn how BitSight for Fourth-Party Risk Management, helps you uncover deep insights into the most crucial and concentrated risk in your extended vendor network so you can proactively manage and remediate risk. With our latest enhancements, you can address concentrated risk within your extended vendor network in a more scalable and efficient way.

Strengthening Resilience Through MITRE ATT&CK

MITRE ATT&CK is, in both depth and breadth, the most extensive attack knowledge base, providing suggested mitigation techniques, detection procedures, and other relevant technical information. MITRE has expanded the Kill Chain to include a wide variety of tactics that are then supported by specific techniques. This organized approach enables FSIs to select and analyze attacks methodically and compare them to the capabilities of internal security controls to understand the gaps.