Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint Security

WatchGuard Earns 8th Consecutive 5-Star Rating in CRN's 2024 Partner Program Guide

CRN has once again honored WatchGuard with a prestigious 5-star rating in its annual Partner Program Guide! The 2024 recognition marks the 8th consecutive year that the WatchGuardONE partner program has earned top marks in CRN’s definitive directory of the most rewarding partner programs for the IT channel.

The 443 Podcast - Episode 283 - Trucking Worms

This week on the podcast we discuss a vulnerability in required commercial truck hardware that could enable an automatically propagating worm across the entire US. Before that, we cover Apple's "un-patchable" vulnerability in their M-series processors as well as a vulnerability that could let attackers unlock hotel room doors at will. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

NEW! Elastic Security 8.13: Manage benchmark rules and automated endpoint responses

Elastic Security 8.13 introduces a refined benchmark-rules experience, advanced endpoint response actions, and a suite of enhancements to help users continue to accelerate their security program. Some of the major features included in this release enable users to: Elastic Security 8.13 is available now on Elastic Cloud — the only hosted Elasticsearch offering to include all of the new features in this latest release.

Endpoint privilege management (Application Control) | ManageEngine PAM360

ManageEngine PAM360 is an enterprise-grade unified privileged access management solution that offers strict governance of privileged users, credentials, digital entities, and other shared sensitive information. In this video, we will help you configure ManageEngine PAM360's endpoint privilege management (Application Control) feature powered by ManageEngine Application Control Plus.

What is anti-tampering protection and how can it help a company's cybersecurity?

Cybercriminals are increasingly using new evasion strategies in their attacks in order to disable or alter company security controls. This year, there has been a surge in the use of hunter-killer malware that seeks to identify and eliminate enterprise defenses such as firewalls, antivirus, and next-generation EDR technologies. A recent report reveals a massive 333% increase in this type of malware.