Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Major cyberthreats to anticipate in the Year of the Horse

This Lunar New Year marks the Year of the Horse, a symbol of speed, endurance and clear direction. These traits carry relevance in today’s cybersecurity landscape. For MSPs, these characteristics aren’t just symbolic, but they’re essential to navigating rapidly changing cyberthreats. As we celebrate Lunar New Year, it’s also a moment to reflect on our own origins.

miniOrange, Securing the SDLC End-to-End | Podcast with Rakesh Falke

Security can’t be an afterthought. In this podcast, Puja More in discussion with miniOrange Engineering Manager Rakesh Falke on embedding security across the SDLC-from architecture (DFDs, sensitive data, GDPR) to secure coding, secrets management, and production hardening. Learn common developer pitfalls, app vs infra security, IaC (Terraform), and how AI tools (Cursor) plus Burp Suite speed up vulnerability detection.

30 Years of Cybersecurity Leadership. Built For What's Next.

Thirty years in cybersecurity doesn’t matter unless it changes something. Technology anniversaries often focus on looking at the past, product launches, or company milestones. But cybersecurity doesn’t reward longevity alone. It rewards outcomes, including safer organizations, stronger partners, and security models that actually work in the real world.

Simplifying how businesses pay creators and contractors worldwide with Trolley - S2E10

In this episode, we're excited to introduce Barnett Klane, VP of Product at Trolley, the leading payouts platform powering the internet economy. Trolley enables businesses to automate global payments to creators, freelancers, and contractors across 210+ countries and territories, serving major companies. Barnett previously founded MyManual and held product roles at Bugcrowd, bringing deep expertise in building products at the intersection of payments, compliance, and creator platforms.

Configuration Rot: Why Security Tools Quietly Stop Working

Security tools don’t usually break. They just slowly stop doing what you think they’re doing. Or perhaps were never set up to do what you needed in the first place. Something got deployed. It worked. Then it drifted. No one noticed. And three years later, you’re questioning the renewal because you’re not even sure what it’s protecting anymore. That’s configuration rot. Thanks to Julian Lee at eChannelNews for the fun, thoughtful and much needed conversation on this topic and more.

WatchGuard's Biannual Internet Security Report 2025 H2 - The 443 Podcast - Episode 359

This week on the podcast, we cover the WatchGuard Threat Lab's Internet Security Report for the second half of 2025. In this episode, we cover the latest trends in malware at both the network perimeter and endpoints, network attacks, and the top malicious domains from the period before, and end with some tips everyone can use to defend their networks.