Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Our 2025 Security Predictions- The 443 Podcast - Episode 316

This week on the podcast, we dive in to the WatchGuard Threat Lab's 2025 security predictions. We'll cover each of the predictions and explain the trends that drove us to making them for the coming year. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Introducing Black Duck Polaris with branching support | Black Duck

Unlock the power of modern app development with the latest Black Duck Polaris Platform feature: Branching support. Developers can now seamlessly scan multiple branches, identify vulnerabilities, and eliminate any critical blind spot early in the development and DevOps process. Branching support provides more transparency and visibility into scanning activities, allowing more secure code to be developed across organizations.

Computer Users Once Again Insist '123456' and 'password' are the Pinnacle of Cybersecurity

... At least according to a recent report posted by the password manager firm NordPass. NordPasses 2024's Top 200 Most Commonly Used Passwords list reflects the sad truth that many people don't take password security seriously and believe codes like "123456" are acceptable. Then some figure, "Hey, the bad guys will never figure it out if I add a couple more digits", and use "123456789". Finally, we have those who seemingly just gave up all hope and used "password".

How Kubernetes Simplifies Configuration Security

This is the second blog post in a series exploring how Kubernetes, despite its inherent complexity, provides features that simplify security efforts. Kubernetes presents an interesting paradox: while it is complex, it simplifies many aspects of deploying and managing containerized applications, including configuration security. Once you navigate its learning curve, Kubernetes unlocks powerful capabilities and tool support that make managing configuration security significantly easier.

Data De-identification: Definition, Methods & Why it is Important

Data is essential. Businesses, researchers, and healthcare providers rely on it. However, this data often contains sensitive personal information, creating privacy risks. Data de-identification helps mitigate these risks by removing or altering identifiers. This makes it harder to link data back to specific individuals. This process is vital for protecting sensitive information and allowing safe data use. Privacy is a growing concern. Regulations like HIPAA set strict rules.

Building a Profitable MSSP: Modern Pricing Strategies for Maximum Growth

MSSPs face a difficult 2025 as several prominent security vendors move toward offering services. Staying profitable will be challenging in an environment where licensing fees are increasing, partners are becoming competitors, and emerging technologies threaten traditional security practices. Create a winning plan by joining Matt Bromiley, Lead Solutions Engineer at LimaCharlie, for an informative webinar on MSSP pricing strategies.

Netwrix Enterprise Auditor Shadow Access

Discover the hidden risks your traditional security tools overlook! With Netwrix Enterprise Auditor, you can uncover shadow access paths to privileged accounts and sensitive data—like domain admin roles or PII—through indirect permissions. Don’t just identify vulnerabilities; eliminate them before attackers exploit them. Close critical security gaps and take your organization’s protection to the next level.

What you need to know about CMMC-from our Director of Government Strategy & Affairs Morgan Kaplan

The Cybersecurity Maturity Model Certification (CMMC) program was developed by the Department of Defense (DoD) to ensure that defense contractors and subcontractors meet the cybersecurity requirements needed to safely and responsibly handle government data. Of primary concern is how commercial vendors safeguard Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).

Cisco Intends to Acquire Threat Detection and Defense Company SnapAttack, Driving Further Splunk Innovation to Power the SOC of the Future

The threat landscape is constantly evolving and expanding, making it more difficult than ever for organizations to keep up and defend against the latest threats. Today’s SecOps teams need cutting-edge security tools and threat intelligence-driven detection content to proactively defend against the latest tactics, techniques and procedures (TTPs) that organizations face today.