Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Automation and AI in Cybersecurity: $2.22 Million in Savings

Over 2024, the average global cost of a data breach reached $4.88 million. This is 10% up from the previous year and the highest amount to date. These figures, published in the Cost of Data Breach Report 2024, also reveal that companies implementing artificial intelligence and automation in their cybersecurity strategies saved an average of $2.22 million compared to businesses that did not adopt them.

Throw MS Defender into Overdrive with LimaCharlie

Looking for a fast, powerful, and easy way to get more control and performance out of Microsoft Defender? LimaCharlie has what you need. Chris Botelho, Senior Solutions Engineer at LimaCharlie, hosted a live walkthrough of our new MS Defender Endpoint Protection extension. Chris demonstrated how our SecOps Cloud Platform enhances MS Defender by providing: Defender Check: Instantly query Windows machines to verify the presence of an active Defender instance.

Tanium Solution Demo: Endpoint Management

The Tanium Endpoint Management solution offers cross-platform lifecycle management from a single console, delivering visibility and control over endpoint assets both on-premises and in the cloud. The solution begins with provisioning new endpoints and continues through the lifecycle of patch management and third-party software deployments, performance monitoring, policy enforcement and issue investigations to give administrators the ability to see, control and remediate in real time.

EDR, DFIR and Endpoint Triage with Brian Carrier

Brian Carrier, CEO of Sleuth Kit Labs, joined Defender Fridays to discuss EDR, DFIR and Endpoint Triage. We explored how SOCs can effectively investigate endpoints after alerts to decide whether to wipe it or call an IR team. Brian covered leveraging EDR data and additional forensic artifacts for better Endpoint Triage, helping teams cut through the overwhelming amount of information to make informed response decisions.

Tanium Appoints Tara Ryan as Chief Marketing Officer to Lead Growth and Brand Strategy for Autonomous Endpoint Management Innovator

Tanium announces the appointment of Tara Ryan as Chief Marketing Officer (CMO). With more than 25 years of experience scaling high-growth SaaS, security, and data-driven technology companies, Ryan brings a deep track record of leading global marketing strategy, brand transformation, and revenue-driving programs from high-growth startups to IPO-stage ventures and beyond.

WatchGuard Launches Total MDR to Deliver Full-Stack AI-Driven Security to MSPs Within One Platform

WatchGuard Total MDR brings endpoint, firewall, identity, network, and cloud security into a single portal, delivering real-time, 24/7, AI-driven protection against threats across hybrid environments.

Total MDR: Real-Time Security for the Whole Attack Surface

Most security tools generate alerts and leave the rest to you. Organizations are already drowning in noise, short on time, and stretched thin on security staff. WatchGuard Total MDR replaces noise with action by delivering the response your team doesn’t have time for. This fully managed, 24/7 MDR service continuously monitors detections across your environment across endpoint, network, identity, and cloud to take real action when threats strike.

Top Security Threats Worldwide Q1 2025

Join WatchGuard CSO Corey Nachreiner and Director of Security Operations Marc Laliberte as they discuss key findings from the WatchGuard Threat Lab’s Q1 2025 Internet Security Report. They’ll cover the latest malware and network attack trends targeting small and mid-sized enterprises and defensive tips you can take back to your organization to stay ahead of modern threat actor tactics.

How To Enforce Least Privilege on Endpoints

Endpoints, which are physical devices like laptops, desktops and mobile phones that connect to a network, are valuable targets for cybercriminals and are often the weakest links in an organization’s security posture. Enforcing the Principle of Least Privilege (PoLP) on these endpoints is essential to reducing attack surfaces, preventing lateral movement and minimizing potential damage caused by compromised accounts.