Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The 443 Podcast - Episode 254 - BlackHat 2023 Recap

In this special end-of-week episode of The 443, we cover some of our favorite talks from this year's edition of the BlackHat cybersecurity conference in Las Vegas. We'll discuss the trends we saw and summaries of interesting topics including AI, nation state warfare, and improving cyber defense. You can view more information on the CISA guidance as well as Blaze Lab's full blog post at the links below.

Data Loss Prevention with Cato Networks [Demo]

Learn how quick and easy it is to secure your sensitive information with DLP from Cato Networks! In this video Robin will show you how to configure, and test, DLP Policies in less time than it would take you to drink a coffee. DLP enables organizations to define a set of rules which govern the movement of data to and from their applications. This is achieved by identifying sensitive information which matches defined data types and taking the appropriate action. DLP also identifies the file type of an asset being requested and can prevent its download of so defined.

17 Best Cloud WAAP & WAF Software in 2023

A web application firewall is a security software that observes and filters HTTP/HTTPS traffic between a web application and the internet. While this has been available for decades, with the evolution of the threat landscape, WAFs have also added additional capabilities to protect not only web apps but also APIs against a range of attacks, including DDoS and bot attacks. So, the category has evolved and is currently called Web Application and API Protection (WAAP).

Overcoming Fear in Cybersecurity: Building Confidence in the Industry

Embarking on a journey in the cybersecurity industry can be daunting, as the fear of making a mistake or tarnishing one's credibility looms large. In this candid discussion, join us as we hear from a seasoned professional who shares their personal experience of battling hesitations and reluctance in the early years of their career. With six to seven years of industry wisdom under their belt, they shed light on how time and experience have led to increased security in their decisions. The struggle to balance credibility and growth is real, especially in the initial phases. Tune in to discover valuable insights on nurturing a sense of security, and find out how providing coaching and support to team members who might be grappling with similar fears can lead to remarkable transformations. If you're a part of the cybersecurity landscape, this is a must-watch for gaining confidence and helping others thrive.

Shared Responsibility Model: Breakdown & Best Practices

There is a widespread misunderstanding regarding cloud services, particularly in relation to Software as a Service (SaaS). Many organizations mistakenly believe that once they migrate to the cloud, the responsibility for all aspects of security and data protection rests solely with the SaaS provider. This misconception creates a false sense of security, which can be detrimental.

The Dark Side of AI: Unmasking its Threats

Artificial Intelligence (AI) has come roaring to the forefront of today’s technology landscape. It has revolutionized industries and will modernize careers, bringing numerous benefits and advancements to our daily lives. However, it is crucial to recognize that AI also introduces unseen impacts that must be understood and addressed for your employees and your organization as a whole. Watch James McQuiggan, Security Awareness Advocate at KnowBe4, in this thought-provoking on-demand webinar where he’ll discuss the unforeseen threats of AI and how to protect your network.

Securing AI Data with Protecto Privacy Vault

AI applications are becoming a primary target for cyber threats due to their reliance on vast amounts of sensitive data. Traditional security measures often fall short in protecting AI-driven environments. A privacy vault is essential for securing AI data, ensuring that sensitive information is protected while enabling innovation. AI models depend on vast datasets for training and operation, but this dependency introduces critical security risks.