Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Inside the SonicWall SSLVPN Attacks

Inside the SonicWall SSLVPN Attacks In this week’s episode of The 443, Marc Laliberte and Corey Nachreiner break down: The recent SonicWall SSLVPN exploits What we know so far and how attackers are getting in The risks for organizations relying on vulnerable VPN gateways Plus: a WinRAR zero-day and a new ChatGPT vulnerability you should know about.

Sensitive Data Leaks: What You Don't Know Can Hurt You #dataleak #sensitivedata #dataprotection

Sensitive data isn’t always obvious attackers can find and exploit information you never realized was exposed via your APIs. In this clip, Wallarm and Oracle experts explain how insurance policies, business documents, or hidden fields can become valuable targets. Learn why broad data discovery and smarter controls are critical to protect your APIs from unexpected leaks.

Ep 6: Security haven or horror story: from SIEMs to lakes to lakehouses

Between SIEMs, data lakes, and data lakehouses, the buzzwords alone could fill a glossary. In this episode, Adam and David break down the real differences between data lakes and SIEM systems and why effectively managing all that data is crucial for staying visible and secure. They also dive into how AI is shaking up the game and why picking the right tools can mean the difference between being overwhelmed and being in control.

New Device Trust Check makes browser extension enforcement easier

Your identity and access management solutions only work if your users comply with the policies you set. Even with the right controls in place, enforcement can break down when users – intentionally or not – find ways around them. That’s why, as we continue to develop Extended Access Management (XAM), we’re focused on embedding enforcement more deeply into everyday workflows across 1Password’s suite of solutions.

How to Make the Case for Cyber Resilience

Organizations are facing a new, critical challenge: how do you justify cybersecurity investments when cyber threats are increasingly sophisticated, yet the risks can often seem abstract and hard to quantify? While executives understand that cyber threats are real, translating those threats into concrete business decisions remains a challenge.

AI in Healthcare: Navigating Data Privacy and Medical Advice

AI in Healthcare: Navigating Data Privacy and Medical Advice In this video, A10 Networks security experts Jamison Utter, Madhav Aggarwal, and Diptanshu Purwar explore the critical security challenges of deploying AI and Large Language Models (LLMs). They focus on protecting sensitive data—especially in areas such as healthcare—and offer key insights on how organizations can effectively secure these powerful technologies.

Combining AI and APIs to close the risk visibility gap: A strategic framework

In this article API integrations have become the backbone of modern digital interactions, yet they also introduce vulnerabilities that can be exploited if left unchecked. The convergence of artificial intelligence (AI) and application programming interfaces (APIs) offers a promising solution to what many refer to as the “risk visibility gap.” This critical gap is defined as the difference between known API vulnerabilities and the unseen or unmonitored risks that arise from their use.

LevelBlue Acquires Trustwave, Ushering in a New Era as the World's Largest, Pure-Play MSSP

Today marks an exciting day for LevelBlue and for the broader cybersecurity industry. I’m pleased to announce that LevelBlue has completed its acquisition of Trustwave, a global leader in cybersecurity and managed detection and response (MDR). This is more than a business transaction; it’s a strategic leap forward in our mission to redefine what it means to be a trusted cybersecurity partner in an increasingly complex, high-stakes world.