Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint Security

65% of companies with shadow IT suffer data loss

The rise of SaaS applications and solutions has revolutionized the way we work. However, the unsanctioned use of these tools, known as shadow IT and shadow SaaS, poses a significant risk to corporate networks. A recent study reveals that the top risks associated with these practices include data loss (65%), lack of visibility and control (62%), and data breaches (52%). In fact, one in ten companies surveyed suspect that the use of tools without the consent of their IT teams has led to a data breach.

Are TP-Link's Days Numbered? | The 443 Podcast

This week on #the443podcast, we discuss the US government's push to investigate the risks that TP-Link network devices introduce to national security. Before that, we give an update on the NPD data breach from last week as well as the threat actor behind it. We also discuss an ongoing cyber incident at the Port of Seattle.

The 443 Podcast - Episode 304 - Are TP-Link's Days Numbered?

This week on the podcast, we discuss the US government's push to investigate the risks that TP-Link network devices introduce to national security. Before that, we give an update on the NPD data breach from last week as well as the threat actor behind it. We also discuss an ongoing cyber incident at the Port of Seattle. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

"Will the Real Platform Please Stand-Up" at Black Hat 2024 - Presented by Maxime Lamothe-Brassard

LimaCharlie CEO, Maxime Lamothe-Brassard, presented "Will the Real Platform Please Stand-Up" at Black Hat 2024. Max dissected the characteristics that actually matter to security practitioners, exploring how a genuine platform should be structured, accessed, and what it must deliver.

NIS 2 Cybersecurity Risk Management Measures Explained

The Network and Information Systems Directive 2 (NIS 2) is a cornerstone of European cybersecurity regulation, imposing stringent requirements on critical infrastructure sectors. To ensure their resilience, NIS 2 mandates specific cybersecurity risk management measures. Let's break down these ten essential measures and understand their implications.

#147 - Product development with Vijay Pitchuman, Director of Product for Identity Management at Okta

On this episode of The Cybersecurity Defenders Podcast we talk about cybersecurity product development with Vijay Pitchuman, Director of Product for Identity Management at Okta.

Hacker Summer Camp 2024 | The 443 Podcast

Our very own Corey Nachreiner and Marc Laliberte took on BlackHat and DEFCON this year, and they’ve got all the insider scoop! From cutting-edge tech to interesting hacks, they’re breaking down the coolest moments from both events. Ready to geek out? Binge-watch all three action-packed episodes now in our bio.