This week on the podcast, we discuss key findings from a DefCon presentation from researchers at AmberWolf titled ZeroTrust, Total Bust and what it means for Zero Trust Network Access. After that, we review a new vulnerability in the FortiWeb WAF before ending with a quick update from Google Project Zero on a new vulnerability disclosure policy. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.
Zero Trust is now one of the most widely adopted approaches in cybersecurity. Its core principle is simple but effective: assume nothing, verify everything. Every access request, every device connection, every transaction - question them all, verify your sources before you do anything, and ultimately keep yourself safe.
Strategic collaboration to advance security information and event management (SIEM) integration specifically tailored for the US federal government's Zero Trust architecture Elastic is proud to be officially recognized as an AWS Zero Trust for Government partner and for onboarding into the AWS Zero Trust Accelerator for Government (ZTAG) program in the US.
Australia’s updated Protective Security Policy Framework (PSPF) now mandates the adoption of Zero Trust principles. Australia’s Protective Security Policy Framework (PSPF) Annual Release 2025 now formally mandates the adoption of zero trust principles to improve cybersecurity posture. Government organisations must now align their cybersecurity strategies with the Information Security Manual and the Guiding Principles to Embed a Zero Trust Culture.
As cyber threats grow more sophisticated, government agencies are struggling to maintain adequate budgets and resources to defend themselves. According to Verizon’s 2025 Data Breach Investigations Report, approximately 88% of data breaches involve the use of stolen credentials, making Identity and Access Management (IAM) essential in protecting sensitive information. The U.S.
One click on a malicious email. One compromised device. That’s often all it takes for malware or ransomware to spread across an entire network in minutes. In other cases, attackers move silently for months before striking. Cato’s agentless microsegmentation stops lateral movement at its source, isolating each device and preventing threats from spreading before they cause real damage.
A recent investigation by Modat has revealed a critical healthcare IoT security breach. More than one million healthcare IoT devices and connected medical systems worldwide are currently exposed online, leaking everything from MRI scans and X-rays to eye exams and blood test results. In many cases, these files are stored alongside patients’ names and other identifying details, creating a significant medical device data breach with far-reaching consequences.
Zero Trust has become the gold standard for modern cybersecurity architectures, built on “never trust, always verify.” Yet a recent study by the Cloud Security Alliance reveals that nearly 1 in 5 organizations have experienced a security incident related to non-human identities, with only 15% remaining confident in their ability to secure them. The culprit? Device identity—the missing link that can render even the most sophisticated Zero Trust strategy ineffective.