Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What's IAM? Identity & Access Management Explained

Identity and Access Management (IAM) is the name for any framework of technology, policies and processes that authenticate and authorize a user in order for that user to access and consume an organization’s resources. Managing user identities and granting appropriate user access helps protect your assets. These assets can include digital access to sensitive information, intellectual property, data and application workloads, network access or perimeter access to the physical data center location.

Opportunists Use 23andMe to Expose Jewish Ashkenazi Descendants Online

23andMe is a personal genome and biotechnology company that provides genetic reports to interested clients. 23andMe employs over 800 employees and operates in California. The company reported $299 million in revenues this year, but the figure will likely drop in the upcoming quarter; opportunists have accessed 23andMe’s systems, resulting in thousands of user records leaking online.

The 443 Podcast - Episode 263 - Q2 2023 Internet Security Report

This week on the podcast, we go through the latest Internet Security Report from the WatchGuard Threat Lab. We'll cover the top malware and network attack trends from Q2 2023 impacting small and mid-market organization globally before ending with defensive tips anyone can take back to their company. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Building a Cyber-Resilient Future Together

Last week in New York, I had the opportunity to attend a panel discussion hosted by SINET and moderated by Upendra Mardikar, the Chief Information Security Officer of TIAA. We discussed everything from security in DevOps, to AI’s pros and cons, and cybersecurity’s future. As long as the attack surface, API usage, and digital footprints increase, so will cyber risk.

Hack the Building 2.0 Hospital - Training New Cybersecurity Talent

This year for the 13th year in a row, the healthcare industry continues to experience the most expensive data breaches worldwide, at an average cost of nearly $11 million – double the cost for the next-highest industry, finance. That’s not surprising; ransomware attacks on hospitals and health systems are constantly in the news. Add to that the cybersecurity talent shortage, which is especially acute (pardon the pun) in the healthcare industry.

From Scan to Strategy: Balancing Vulnerability Assessments with Penetration Testing in Cybersecurity

In the realm of cybersecurity, there's a common analogy that likens the process to a health checkup. Vulnerability scanning, in this context, can be seen as a basic health screening. It's a preliminary step, offering a snapshot of potential issues within a system. It's like getting your blood pressure or cholesterol checked during a routine visit to the doctor. These tests are essential, providing a quick overview of potential health concerns. But they don't give the full picture.

Automatic Application Protection using Red Hat Advanced Cluster Management with Trilio (with Audio)

(With Audio) See how easy it is to protect a newly deployed application into OpenShift using Red Hat Ansible Automation Platform, followed by an ACM Policy written for Trilio that will auto protect the deployed application (create a backup, according to the policy) In this video we will show you an example of using Red Hat Advanced Cluster Management (or ACM) and Trilio to automatically back up an application that has just been deployed.

Restore your OpenShift Virtualization VMs with Trilio (With Audio)

Use the Trilio UI to Restore your OpenShift Virtualization Virtual Machines. In this video we will show you how to restore a previously backed up virtual machine running in OpenShift using Trilio As we are restoring a virtual machine to the same cluster that we backed up earlier, we can use the Trilio User Interface to simply list the deployed virtual machines, and see that the status of the last backup is marked as Available for this virtual machine.

Backup your OpenShift Virtualization VMs with Trilio (With Audio)

Use the Trilio UI to Backup your OpenShift Virtualization Virtual Machines. In this video we will show you how to backup individual virtual machines from OpenShift using Trilio. First we are going to log in to the Trilio User Interface using our OpenShift credentials. Trilio has a Backup Wizard that allows you to select your individual VMs that you have access to in your cluster. We’ll select this Virtual Machine and click Next.