Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

MFA phishing: the cyberattack that is compromising big company networks

Cybercriminals are well versed in the tactic of phishing, which aim to trick users into revealing confidential information and gain unauthorized access to user accounts and compromise corporate networks. A new type of phishing attack has now emerged, known as MFA phishing, which manages to evade the key protection measures deployed by corporate networks.

What is the difference between XDR and SIEM?

Over the past twenty years, security information and event management (SIEM) platforms have been one of the key solutions for cybersecurity management, as they help security teams centralize attack and threat detection activities. The cybersecurity industry is now shifting towards a new type of solution known as extended detection and response (XDR). As the two technologies are similar and have overlapping capabilities, many people still don’t know how they differ.

How can MSPs capitalize on business in 2023?

The managed service provider (MSP) industry continues to expand, and this trend is not likely to change any time soon. Even in the current economic situation, where recession is in sight, demand for MSPs remains strong, resulting in growth opportunities this year. This is backed by the fact that 58% of participants at WatchGuard's webinar Top 3 Growth Opportunities for MSPs in 2023 and Beyond believe that cybersecurity spending will be maintained going forwards.

On May the 4th a Strong Password Be With You!

World Password Day falls on May the 4th this year, or “May the 4th Be With You!” for those who recognize this date as the annual celebration of Star Wars Day. For the 2023 observance of the latter, fans around the world (including myself) will rejoice as Carrie Fisher (aka “Princess Leia”) is honored with a posthumous star on the Hollywood Walk of Fame.

Wi-Fi Security and Zero-Trust Network Architecture: Why You Need Both

In today's digital world, cyber threats are becoming increasingly sophisticated and harder to detect. Traditional security measures such as firewalls and VPNs are no longer enough to protect against ever-evolving threats. This is where zero-trust network architecture comes into play. In this blog post, we'll explore zero-trust network architecture and how it can work alongside Wi-Fi security to provide robust protection for your network.

Secure-by-Design and -Default: How WatchGuard Fulfills CISA's New Guidance

CISA and its counterparts around the world have published new guidance advising technology manufacturers to prioritize Secure-by-Design and Secure-by-Default in all product design and development processes, and urging customers to hold them accountable for doing so.

WatchGuard Wins Three GOLD Globee Awards for Sales, Marketing, Service, & Operations

We’re thrilled to share that WatchGuard has been recognized with Three GOLD wins in this year's Globee Awards for Sales, Marketing, Service, & Operations program. The Globee Awards are renowned for being the world’s leading business awards and aim to acknowledge and celebrate outstanding performance demonstrated by organizations.

WatchGuard Wins Seven Awards at 2023 Global InfoSec Awards

We’re thrilled to share that Cyber Defense Magazine has once again awarded WatchGuard with seven wins at this year’s Global InfoSec Awards! The judges of this coveted awards program selected the 2023 winners based on three key areas of excellence including nominees’ understanding of tomorrow’s threats, today, provision of cost-effective solutions, and innovation in new and novel ways that help to better mitigate cyber risk and stay ahead of the next breach.

Why MSPs should add MFA and endpoint protection to firewalls in their security offerings

Firewalls are a key component in cybersecurity to protect corporate networks from external threats. However, these barriers must be accompanied by solutions that complement each other and build a layered security posture to help prevent vulnerabilities from exposing networks to malicious activity, at all and any cost.