Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

May 2024

Navigating the NIS 2 Landscape - Part 1

The European Union (EU) is taking a significant step forward in the fight against cybercrime by introducing the Network and Information Systems Directive 2, or NIS 2. This directive represents a major overhaul of cybersecurity regulations across the continent, aiming to bolster defenses against the ever-evolving threats of the digital age. In this first of four blog posts, we will introduce the basics of NIS 2.

How to Elevate Cybersecurity for Financial Services Companies

The technology landscape is changing rapidly, presenting new challenges for security in the financial services sector. Generative artificial intelligence, automation, data management, and integrated finance are just some of the trends that are transforming this landscape. As the demand for personalized experiences grows, the challenges of ensuring data security and privacy are increasing, among other things, making it harder to manage digital identities.

Why an outdated router can compromise your company's security

In today's digital age, where interconnectivity is the norm, routers act as custodians of business information. These devices, which can sometimes be undervalued, control data traffic between our devices and the global network. However, recent events have highlighted vulnerabilities that may affect a large number of routers, raising concerns about the protection of sensitive information handled by enterprises.

The 443 Podcast - Episode 292 - SSID Confusion Attacks

This week on the podcast, we cover a newly disclosed weakness in the 802.11 Wi-Fi standard that affects common enterprise Wi-Fi deployments. Before that, we discuss CISA's Secure by Design Pledge for technology vendors before ending with a Microsoft research post on Quick Assist social engineering. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Poor cyber hygiene causes over 50% of cybersecurity incidents

The security habits that companies and employees adopt on a daily basis are almost as important as the cybersecurity solutions they implement. Even if a sophisticated and seemingly robust cybersecurity system is in place, inadequate practices and usage can lead to cybersecurity incidents and breaches that have serious consequences. Failing to cultivate good cybersecurity practices in a company's culture can prove a determining factor when dealing with potential threats.

WatchGuard Wins Three 2024 Global InfoSec Awards

We’re delighted to share that Cyber Defense Magazine has honored WatchGuard Technologies with three awards in its 2024 Global InfoSec Awards program! The coveted annual awards, now in their 12th year, recognize information security (InfoSec) innovators from around the globe who deliver a unique and compelling value proposition for their product or service. A panel of independent judges selected the winners in each category.

Seattle Kraken IT Joins The 443 Podcast

In a very special episode of #the443Podcast, WatchGuard Director of Security Operations, Marc Laliberte sits down with Seattle Kraken Cybersecurity Engineer, Ryan Willgues to discuss how Ryan got his start in IT, what it’s like working for an NHL franchise, how the Kraken have deployed WatchGuard’s Unified Security Platform, and much more. Deep dive into the Kraken deployment of the WatchGuard’s products in this case study.

Seattle Kraken Deploy WatchGuard's Unified Security Platform

We’re proud to announce the recent deployment of our Unified Security Platform architecture for the Seattle Kraken, providing comprehensive protection against cyber threats for the NHL’s 32nd franchise. The Kraken now rely on WatchGuard to provide complete protection for their organization as the official cybersecurity sponsor of the Seattle Kraken.

The 443 Podcast - Episode 291 - Picking Secure Technologies

This week on the podcast, we cover guidance from CISA and its international partners that guides organizations on the right questions to ask during the technology procurement process to make sure the products they buy are secure. Before that, we cover Microsoft's research into a common vulnerability impacting over 4 billion Android application installations followed by a discussion on the Tunnel Vision VPN vulnerability.

Verizon DBIR Breakdown - The 443 Podcast, Ep. 289

📽️ 🔊 This week on #the443podcast, Corey Nachreiner and Marc Laliberte cover the key takeaways from the 2024 Verizon Data Breach Investigations Report. Before that, they discuss what we learned from United Healthcare CEO Andrew Witty’s congressional testimony on their ransomware attack in February. Corey and Marc end with a discussion on a research article from JFrog on malicious Docker Hub repositories.

What you need to do to elevate your data protection

Data theft is a growing concern for companies and users alike. More and more attacks are being launched with the aim of gaining access to third-party data, and the number of people affected is on the rise. The unease organizations are experiencing over these threats is backed by the statistics. According to one report, 422 million people were victims of data theft in 2022.

The 443 Podcast - Episode 289 - The 2024 Verizon DBIR

This week on the podcast, we cover the key takeaways from the 2024 Verizon Data Breach Investigations Report. Before that, we discuss what we learned from United Healthcare CEO Andrew Witty's congressional testimony on their ransomware attack in February. We also discuss a research article from JFrog on malicious Docker Hub repositories. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Malware-as-a-Service (MaaS): How to protect your customers

The cyberthreat landscape is in a state of constant evolution. As the digital dependency of businesses grows, so do the opportunities for those looking to take advantage of it. In recent years, we have witnessed an upsurge in a new type of malicious actor: the non-technical cybercriminal.