Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Network Visibility is Essential for Your Organization

Most modern companies are highly reliant on their IT infrastructure for day-day business, with employees relying on numerous on-prem and cloud-based software solutions for their daily activities. However, for many companies, the network can be something of a black box. As long as data gets from point A to point B and applications continue to function, everything is assumed to be okay. However, the network can be a rich source of data about the state of the business.

Top 3 requests a helpdesk team should NEVER ask you

Our 2nd-Line Cloud Engineer Nathan, sits down with Jennifer to go through some of the BASIC requests a helpdesk team should never ask! 🎯 His top 3… 👉 We will never ask you to click a link via email 👉 We would never ask for your password 👉 MFA codes - we will never send a request for this information Want to know more about how your business can adopt a Zero-Trust approach? Find out here: bit.ly/3Wa08Pl.

CISO Matters: Rise of the Machines - A CISO's Perspective on Generative AI

Humans have been interacting with a version of AI through voice assistants, facial recognition software and phone photo apps for years. AI’s progress in the last few months, however, has been nothing less than mind-blowing. With its new enhanced capabilities, a meteoric rise in AI’s popularity ensued, and the recent new generative AI services are quickly becoming essential tools for users of all kinds.

Securing Our Data: Restrict Removable Media Devices on High-Priority Information Systems

Removable media devices—also known as removable storage devices–present a very high risk to sensitive data stored, processed, or transmitted by information systems in your organization. Sedara recommends implementing strict measures to safeguard sensitive information and prevent its accidental or intentional loss, misuse, or disclosure.

Top 5 Most Dangerous Cyber Security Threats, SANS Reveals

Experts from around the globe gathered at the RSA Conference 2023 in San Francisco, and shared what they are predicting to be the 5 most dangerous cyber security threats impacting organisations today. The panel consisted of four respected SANS analyst experts, invited to explore the latest Tactics, Techniques and Procedures (TTP’s) of modern adversaries, and empower organisations with the correct detection and defence advice.

What is Cyber Risk Governance?

Cyber risk governance (also called cyber risk governance or governance, risk, and compliance — GRC) and cyber risk management are often used interchangeably, but they are actually very different parts of the way an organization achieves data protection. While cybersecurity risk management focuses on implementing cybersecurity controls, cyber risk governance is more concerned with the strategy behind that implementation.

EP 239 MSPs Around the World Americas 443 Podcast YouTube Short

This week’s podcast comes from the WatchGuard Americas Apogee Partner Conference, where we bring on special guests Kevin Willette of Verus Corporation and Neil Holme of Impact Business Technology to discuss the challenges and opportunities MSPs and MSSPs will face in the coming years. This is the first of a multi-part series where we explore similar questions worldwide.