Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Agentic SecOps Workspace demo: AI agents operating inside LimaCharlie

LimaCharlie CEO/Founder, Maxime Lamothe-Brassard, walks through LimaCharlie's Agentic SecOps Workspace in this demo, showing how AI agents can directly operate security infrastructure using the platform's complete API coverage. What you'll see.

You Don't Need 20 Different Perimeters. You Need One Identity Fabric.

Guest post by WatchGuard Tech All-Star, Michael Carter II At a glance: The trend is hard to ignore: most attackers do not “break in” anymore; they sign in using stolen or abused identities, not by bypassing a next-gen firewall, your EDR, or those fancy email and collaboration tool defenses. If an unauthorized identity can export it, you have not protected it, no matter how many controls you have in place.

Effective Response: A Key Factor in Your Reputation as an MSP

In cybersecurity, incidents test more than just technical resilience ‒ they also test trust. As a managed service provider (MSP), the preventive measures you implement are critical. However, the strength of your support during your clients’ most critical times is what truly defines the trust they have in you. A cybersecurity incident may be precisely the moment when your client evaluates whether you are delivering on your promises as a quality partner for their business.

Airlock Digital Announces Independent TEI Study Quantifying Measurable ROI & Security Impact

Airlock Digital, a leader in proactive application control and endpoint security, announced the release of The Total Economic Impact (TEI) of Airlock Digital, an independent study commissioned by Airlock Digital and conducted by Forrester Consulting. The study demonstrates a significant 224% return on investment (ROI) and a $3.8 million net present value (NPV) over three years for organizations adopting Airlock Digital's allowlisting approach. These findings underline both the financial and security value of Airlock Digital's solution.

Decoding MITRE ER7: How to Interpret Results That Matter

MITRE ATT&CK Evaluations attract strong attention across the cybersecurity industry by providing detailed, transparent data on how endpoint security solutions behave under real attack conditions. However, the depth of the results often makes them difficult to interpret and compare meaningfully. Join Field CTO Adam Winston as he decodes WatchGuard’s MITRE ER7 results and learn how to weigh key metrics to determine real-world security effectiveness and efficiency.

Uncovering A Mass VPN Phishing Campaign - The 443 Podcast - Episode 355

This week on the podcast, we cover some first-hand research from the WatchGuard Threat Lab on a phishing campaign targeting users of nearly every major VPN vendor. After that, we discuss two recently resolved vulnerabilities in the Fortinet FortiSIEM application, then end with research from Varonis on a new attack flow against Copilot called RePrompt.

Switch from SonicWall and Succeed

If you use SonicWall, you know what type of year 2025 was for your business. Between breaches, price increases, and confusing pivots, your vendor left you to clean up their mess while you paid more for their product and earned less in return. Join Adam Winston, Field CTO at WatchGuard Technologies, to learn why our Unified Security Platform is the right choice for a profitable, worry-free 2026. In this session, we’ll discuss.

10 Security Risks Solved by Modern Mobile Enterprise Solutions 

In today's digitally driven business landscape, the proliferation of mobile devices has unlocked unprecedented productivity and flexibility. However, this shift has also introduced a complex array of security vulnerabilities that legacy IT infrastructures are ill-equipped to handle. From unsecured endpoints to data leakage, organizations can face significant threats that can compromise sensitive information and operational integrity.

MITRE ER7 Explained: From Detection to Operational Efficiency

MITRE ATT&CK ER7 results are often reduced to simple headlines: detection percentages, prevention rates, or “100% coverage” claims. But those numbers alone don’t explain how a security platform actually behaves when an attack unfolds, nor how much operational effort is required to manage it. To understand the real impact of ER7 results, you need to look at detection efficiency and operational efficiency, not just raw coverage.