Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How MSPs can overcome zero-trust barriers

Zero-trust cybersecurity strategies stimulate digital transformation of businesses. As this approach reduces threat risks appreciably, companies have more incentives to make changes to their systems or invest in new technologies. 59% of organizations take this view, according to the Watchguard Pulse Maturity of Zero-Trust in 2022 survey conducted with IT leaders from businesses across the world.

LimaCharlie: Security Infrastructure as a Service

Full featured free tier of two agents. LimaCharlie provides cybersecurity tools and infrastructure on-demand in a way that scales. We call this approach Security Infrastructure as a Service. It is a DevOps or engineering-centric approach to cybersecurity. A way of getting things done that would feel familiar to anybody that has worked with Amazon Web Services or any other major cloud provider. There are no contracts and no minimums. Easily get what you want and only pay for what you use.

How to stop sophisticated ransomware attacks

The number and frequency of ransomware cyberattacks are growing every year. The European Union Agency for Cybersecurity (ENISA) recorded a 150% increase in 2020 alone and, as of last year, ransomware attacks have become the number one threat. Added to this, the recovery costs and downtime incurred can be up to 10 to 15 times higher than the ransom demanded by cybercriminals.

A vulnerable Wi-Fi network puts your organization's data at risk

A few weeks ago, a cybersecurity analyst unexpectedly discovered that he could dump files from the hotel network system where he was staying in Qatar to his own computer using the sync tool (used for file synchronization). Through an HSMX Gateway, he managed to access a welter of sensitive data held on an FTP server used for backup purposes. This included personal information on guests such as their room numbers, emails, and cell phone numbers.

LimaCharlie: Security Infrastructure as a Service

Full featured free tier of two agents. LimaCharlie provides cybersecurity tools and infrastructure on-demand in a way that scales. We call this approach Security Infrastructure as a Service. It is a DevOps or engineering-centric approach to cybersecurity. A way of getting things done that would feel familiar to anybody that has worked with Amazon Web Services or any other major cloud provider. There are no contracts and no minimums. Easily get what you want and only pay for what you use.

Cybersecurity Insights - MFA Requirements for Salesforce

Salesforce started enforcing the use of multi-factor authentication since February 1st 2022, and they will be auto-enabling it as well. Companies using Salesforce should make sure they implement MFA with the right methods in order to comply with contractual obligations, but also to protect against attacks using stolen credentials.

WatchGuard Honored in Seven Categories at the 2022 Cyber Defense Global InfoSec Awards

WatchGuard has once again been recognized at the annual Cyber Defense Global InfoSec Awards in seven categories, including the coveted Top Women in Cybersecurity title. Cyber Defense Global InfoSec Award winners represent the most innovative and proactive cybersecurity companies around the world that are constantly working to bring tomorrow’s cybersecurity solutions to today’s market. Check out the full line-up of WatchGuard’s 2022 Cyber Defense Global InfoSec Awards wins here.

How confident are you in managing your devices securely over the internet?

Managing roaming users from a central point has always been daunting. Enterprises found it easy when they had to manage devices inside a network. Having firewalls on either side of the boundaries and restricting susceptible APIs and network packets, businesses found it convenient to manage their devices. Is this a realistic scenario today? Enterprises are evolving. Work patterns have inclined towards modern approaches. Hybrid work patterns are the encouraged mode for working.

Trustwave and Microsoft Defender for Endpoint Integration

Trustwave Managed Detection and Response services integrate with Microsoft Defender for Endpoint to take containment, eradication, and recovery actions directly on the endpoint, delivering a streamlined experience for the end users. For further information on how to truly integrate your cyber defense team with industry-leading services and technologies, watch our overview of how Trustwave partners with Microsoft.

Three reasons why Security Operations Centers (SOCs) are adopted

Company IT and security teams are facing cybersecurity challenges that increasingly test their defensive capabilities. Organizations have to protect themselves from a growing number of incidents (one attack every 39 seconds, according to the University of Maryland) and sophisticated threats, many of which have serious consequences.