Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Identity Enrichment with the Falcon Browser Extension and Next-Gen Identity Security

Falcon Next-Gen Identity Security enriches cloud authentication with verified endpoint context using the Falcon sensor and Browser Extension. Watch the demo to see how CrowdStrike eliminates blind spots between endpoint and cloud to accelerate investigations and stop identity-based attacks.

Stryker's Network Disruption - The 443 Podcast - Episode 362

This week on the podcast, we cover the cyber attack that managed to wipe more than 200,000 resources off of the medical technology giant Syryker's network. After that, we review a research post on a good chrome extension gone bad. We end by discussing a recent Microsoft threat intelligence post on how North Korean-backed threat actors have operationalize AI for job scams.

Automation vs. Augmentation: What AI Means for Your Team

AI is everywhere in cybersecurity. For partners, the real question is not about the technology. It is about your people. Is AI replacing analysts, or making them more effective? In this session, we break down the differences between automation and augmentation and why they matter for MSPs delivering security services. Automation removes repetitive SOC work such as triage, enrichment, and basic containment. Augmentation strengthens human experts with faster investigation, clearer attack mapping, and smarter response decisions.

What security leaders need to know about zero trust identity management in 2026

The evolution of cybersecurity challenges and the rapid pace of digital transformation have led security leaders to focus increasingly on robust and adaptive security frameworks. Among them, zero-trust identity management has emerged as a cornerstone of modern security strategies.

Rory Innes Calls for Better Cybercrime Support in London

On 11th March, our CEO, Rory Innes, stood before the London Assembly’s Police and Crime Committee to represent a group of people who are too often overlooked: victims of digital fraud, cybercrime and online harm. In a session focused on how the Metropolitan Police Service’s Cyber Crime Unit is protecting Londoners from digital fraud, Rory made a direct and powerful case for why the current system is failing the public.

How to Evaluate AI Workload Security Tools for Enterprise Teams

You’ve sat through three vendor demos this week. Vendor A showed you an AI-SPM dashboard with a pie chart of misconfigurations. Vendor B showed you a nearly identical dashboard with different branding and a slightly wider set of compliance frameworks. Vendor C showed you posture findings with an “AI workload” tag that wasn’t in their product last quarter.

AI Workload Security on AWS: Evaluating Native Tools vs Third-Party Solutions

Your Bedrock agent running on EKS receives a prompt through your RAG pipeline. CloudTrail logs it as a normal bedrock:InvokeModel event—status 200, authorized IAM role, expected endpoint. But inside the container, the agent’s response triggers a tool call that spawns curl to an external IP, exfiltrating the context window. GuardDuty doesn’t flag it because the connection routes through a permitted VPC endpoint. You open your AWS console and see a healthy API call.