Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint protection - the ultimate guide in 2023

Calling all enterprises, endpoint management is changing. New endpoint protection platforms & AI-powered solutions are a game-changer for companies looking to enhance their security capabilities and remain bulletproof. The worst of the pandemic appears to be behind us; however, enterprises are still adjusting to the post-COVID new normal. For many industries, remote work and the hybrid office remain essential adjustments that are not going back to normal.

The 443 Episode 218 - Attack Surface Management

This week on the podcast we dive into the world of attack surface management. We discuss what your attack surface is made up of including some areas you may not have thought of and then cover the best ways to reduce and ultimately protect it. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

80% of companies experience security incidents in the Cloud

Migrating to the Cloud brings many advantages for companies. First of all, they reduce their operating costs by almost 40%. They also increase their agility, reduce the maintenance time of traditional IT infrastructures, and gain flexibility and scalability. However, as the number of workloads deployed in the Cloud grows, more and more organizations are struggling to keep pace with security requirements.

Detection notes: In-memory Office application token theft

When we hear the term “Credential Access” our detection engineer thoughts typically turn to the Windows LSASS Process and tools like Mimikatz. Recently, however, researchers have drawn our attention to Microsoft Office processes. These processes also store credential material, in the form of access tokens.

CRN Names WatchGuard to the 2022 Edge Computing 100 list

WatchGuard has been recognized by CRN in the 2022 Edge Computing 100 list in the Security category. This prestigious list highlights leading technology innovators that supply channel partners with next-generation edge technologies that allow businesses to capture, process, and use data in more intelligent ways. The categories recognized in this list include Edge Hardware, Software and Services; IoT and 5G Edge Services; and Security.

Demo: Upgrading a Firebox

Because smaller companies are generally less protected and easier to break into, small business has become the new "big target" for cyberattacks. The Firebox M390 firewall is specifically engineered to defend all types of small businesses against attacks that are no less fierce than those targeting larger organizations. In this video, we show just how simple it is to upgrade your firewalls to the M390 with the optional Total Security Suite.

Extend endpoint visibility with Google Chrome and Splunk security

Ever wondered how to find bad actors using only browser data? Attend this session to get a deeper understanding of the integration between Google Chrome and Splunk. See how to ingest data, and use it for threat hunting and adversarial identification. Speaker: James Young - Staff Security Strategist.

Modern SOC and MDR services series I: What they are, why they matter

Inadequate cybersecurity is a severe issue that challenges SMBs and enterprises indiscriminately, putting them at risk. Reasons for the business impact include: To help businesses navigate cybersecurity risks, many delegate to internal or external security operation centers (SOC).