Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

April 2023

Wi-Fi Security and Zero-Trust Network Architecture: Why You Need Both

In today's digital world, cyber threats are becoming increasingly sophisticated and harder to detect. Traditional security measures such as firewalls and VPNs are no longer enough to protect against ever-evolving threats. This is where zero-trust network architecture comes into play. In this blog post, we'll explore zero-trust network architecture and how it can work alongside Wi-Fi security to provide robust protection for your network.

Secure-by-Design and -Default: How WatchGuard Fulfills CISA's New Guidance

CISA and its counterparts around the world have published new guidance advising technology manufacturers to prioritize Secure-by-Design and Secure-by-Default in all product design and development processes, and urging customers to hold them accountable for doing so.

WatchGuard Wins Three GOLD Globee Awards for Sales, Marketing, Service, & Operations

We’re thrilled to share that WatchGuard has been recognized with Three GOLD wins in this year's Globee Awards for Sales, Marketing, Service, & Operations program. The Globee Awards are renowned for being the world’s leading business awards and aim to acknowledge and celebrate outstanding performance demonstrated by organizations.

The 443 Episode 239 - MSPs Around the World - Americas

This week's podcast comes from the WatchGuard Apogee partner conference for the Americas where we bring on special guests Kevin Willette of Verus Corporation and Neil Holme of Impact Business Technology to discuss the challenges and opportunities MSPs and MSSPs will face in the coming years. This is the first of a multipart series where we explore similar questions around the world. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

WatchGuard Wins Seven Awards at 2023 Global InfoSec Awards

We’re thrilled to share that Cyber Defense Magazine has once again awarded WatchGuard with seven wins at this year’s Global InfoSec Awards! The judges of this coveted awards program selected the 2023 winners based on three key areas of excellence including nominees’ understanding of tomorrow’s threats, today, provision of cost-effective solutions, and innovation in new and novel ways that help to better mitigate cyber risk and stay ahead of the next breach.

The 443 Podcast, Ep. 238 - Zero Trust Maturity Model 2.0

This week on #the443podcast, Corey Nachreiner and Marc Laliberte cover two new publications out of CISA. First, we dive into CISA’s guidance to manufacturers and customers on secure-by-design and secure-by-default products. Next, they discuss CISA’s latest Zero Trust Maturity Model, which any organization can use to gauge how far along they are on the ZTA path and where they should focus their efforts next. Finally, we end with some research from Blaze Information Security on a series of vulnerabilities in a play-to-earn blockchain game.

Webinar: Top Security Threats Worldwide: Q4 2022 - 20 April 2023

Join WatchGuard CSO Corey Nachreiner and Sr. Security Analyst Trevor Collins as they discuss key findings from the WatchGuard Threat Lab’s 2022 Q4 Internet Security Report. They’ll cover the latest malware and network attack trends targeting small and midsized enterprises and defensive tips you can take back to your organization to stay ahead of modern threat actor tactics.

The 443 Podcast, Ep. 237 - Operation Cookie Monster

This week on the podcast, Corey Nachreiner and Marc Laliberte discuss another cybercrime marketplace takedown dubbed Operation Cookie Monster. After that, they discuss Microsoft’s attempts to limit the distribution of a popular hacking toolkit. Finally, we discuss a recent analysis by Dr. Ken Tindell of Canis Automotive Labs about how criminals could steal his friend’s Toyota Rav4.

Why MSPs should add MFA and endpoint protection to firewalls in their security offerings

Firewalls are a key component in cybersecurity to protect corporate networks from external threats. However, these barriers must be accompanied by solutions that complement each other and build a layered security posture to help prevent vulnerabilities from exposing networks to malicious activity, at all and any cost.

Unified vs API-Based Integrated XDR Platform: What's the difference?

The terms unified and integrated are often used interchangeably in the software world. However, security leaders must understand the differences between deeply unified and API-based integrated platforms within an organization and how they can significantly impact everything from cost to efficiency. First, it is essential to define the terms.

The 443 Podcast, Ep. 236 - Another Software Supply Chain Attack

This week on The 443, Corey Nachreiner and Marc Laliberte discuss the latest software supply chain attack with a potential blast radius of thousands of organizations. They then cover a new protocol vulnerability in the Wi-Fi wireless standard before ending with some research into insecure Microsoft Azure applications.

The 443 Episode 238 - Zero Trust Maturity Model 2.0

This week on the podcast, we cover two new publications out of CISA. First, we dive into CISA's guidance to manufacturers and customers on products that are secure-by-design and secure-by-default. Next, we discuss CISA's latest Zero Trust Maturity Model which any organization can use to gauge how far along they are on the ZTA path and where the should focus their efforts next. Finally, we end wit some research from Blaze Information Security on a series of vulnerabilities in a play-to-earn blockchain game.

Key trends shaping the cybersecurity channel in 2023

The global economic landscape is shifting. Cybersecurity skill shortage, inflation, and supply chain concerns are key issues contributing to price hikes and increased business costs. In this challenging environment, end customers are evaluating their spending, and channel partners, especially those delivering managed services, have been planning to raise prices on their services.

How to Pitch Zero-Trust to Technology Executives

Why should organizations fund zero-trust architectures? The business benefits of zero-trust are significant. By adopting the "never trust, always verify" mindset, organizations shift to a more centralized security management approach, which can result in cost-effectiveness and a stronger layer of protection for resources such as identities, data, and applications.

WatchGuard Recognized in BIG's 2023 Excellence in Customer Service Awards

We’re thrilled to share that the Business Intelligence Group has named WatchGuard’s George Grinnell an “Executive of the Year” winner and recognized WatchGuard’s Mark Allan Marra with a win in the “Manager of the Year” category as part of its 2023 Excellence in Customer Service Awards! Business Intelligence Group has also honored WatchGuard’s Customer Support team as a finalist in the “Organization of the Year” category.

The 443 Episode 237 - Operation Cookie Monster

This week on the podcast, we discuss another cybercrime marketplace takedown dubbed Operation Cookie Monster. After that, we discuss Microsoft's attempts to limit the distribution of a popular hacking toolkit. Finally, we discuss a recent analysis by Dr. Ken Tindell of Canis Automotive Labs around how criminals were able to steal his friend's Toyota Rav4. You can view Dr. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Five cybercriminal entities sell access to 2,300 corporate networks

It’s not possible to talk about a successful cyberattack without prior access to the target company's network. Initial access brokers (IABs) are the malicious actors that perform this first step, and they are making accessing enterprise networks easier than ever.

The 443 Episode 236 - Another Software Supply Chain Attack

This week on The 443, we discuss the latest software supply chain attack with a potential blast radius of thousands of organizations. Then we cover a new protocol vulnerability in the Wi-Fi wireless standard before ending with some research into insecure Microsoft Azure applications. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

4 opportunities MSPs can leverage from cyber insurance

The rapid escalation of cyberattacks around the world has increased the number of prerequisites to qualify for a cyber insurance policy. If a business faces a cyberattack involving a data breach, it may find it hard to recover without additional support or resources. And this is just one example.