Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Microsoft Warns Customers of Email Breach by Russian Hackers

In a recent security disclosure, Microsoft has warned more of its clients that Russian hackers have accessed emails exchanged between them and the company. This breach, attributed to the notorious "Midnight Blizzard" hacking group, has raised significant concerns about the security of communications with Microsoft.

The 443 Podcast - Episode 296 - OpenSSH regreSSHion Vulnerability

This week on the podcast, we cover OpenSSH's recent critical vulnerability and what it means for systems administrators. Before that, we discuss the CDK Global ransomware attack impacting car dealerships across the us, a Korean internet service provider delivering malware to their customers, and a takeover of a popular JavaScript library gone hostile. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

AI Audit Logs: The Secret Weapon to Enhance Enterprise Security

In the rapidly evolving landscape of artificial intelligence (AI), ensuring robust security and compliance is becoming more difficult for enterprises. AI audit logs emerge as a critical tool in this mission, offering a detailed record of all activities within AI systems. By leveraging these logs, businesses can enhance their security posture, ensure regulatory compliance, and optimize AI usage. Let's delve into how AI audit logs can serve as a secret weapon in bolstering enterprise security.

Developing in the Age of AI, with Cloudflare's Ricky Robinett

Experience a deeper understanding of AI's transformative potential! Watch our exclusive video, 'Developing in the Age of AI,' featuring profound insights shared by Cloudflare’s Vice President of Developer Relations, Ricky Robinett. Explore the dynamic convergence of cybersecurity and AI efficacy. Share your details to unlock privileged access to this video, empowering you with the profound insights that shape the technological landscape.

Friedemann Kurz reacts to Cato's latest SASE video

We put Friedemann Kurz, Head of IT Porsche Motorsport, in the hot seat! From securing high-speed data to celebrating victories, he reveals it all while watching our newest video with the TAG Heuer Porsche Formula E Team. Catch his reactions and insights on why network security is crucial for reaching the podium. Let’s connect.

Want Your Third Parties To Take Security Seriously?

In the last decade, outsourcing to third parties–especially in the gig economy–has taken over key functions that enterprises used to handle internally. Today’s companies are frequently virtual–using third-party services that span the likes of application development, back-office corporate functions, contract manufacturing and research, marketing, and core IT services.

10 important questions to add to your security questionnaire

The technology your organization uses is integral to its success. When selecting vendors, security should be at the forefront of your decision. A strong vendor review process is crucial for selecting partners that align with your company's security goals, and security questionnaires are a key step in this process.

Upcoming Election - Cyber Risks to The Public Sector

As the anticipation builds for the upcoming election this week, the spotlight shines brightly on the critical role of cybersecurity in safeguarding the integrity of the democratic process. In a landscape where digital threats loom large, ensuring robust cyber defenses is paramount to upholding transparency, protecting voter data, and preserving the sanctity of our electoral system.

Improving Patch and Vulnerability Management with Proactive Security Analysis

Vulnerability management is the continuous process of identifying and addressing vulnerabilities in an organization’s IT infrastructure, while patch management is the process of accessing, testing, and installing patches that fix bugs or address known security vulnerabilities in software applications. Vulnerability management and patch management are crucial SecOps processes that protect IT assets against cyber threats and prevent unauthorized access to secure systems.