Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint Security

Advanced Access Control with Network Access Enforcement

Learn how to enhance your network security with WatchGuard's powerful Network Access Enforcement feature. Discover how to restrict access to your network based on device health and compliance, as well as protect against unauthorized connections and malicious threats. Improve overall network performance and security with Advanced Access Control with Network Access Enforcement.

Zero Trust + AI: fewer alerts, guaranteed security

Excessive cybersecurity alerts are not a trivial matter; they pose a real challenge that directly impacts business security strategies. Too many notifications generate stress on IT teams, which are increasingly being reduced in size while facing a heavier burden of tasks. This situation can lead to urgent alerts being overlooked, putting system security at risk.

The White House Tackles BGP Security | The 443 Podcast

This week on the podcast, Corey Nachreiner and Marc Laliberte discuss guidance published by the US White House Office of the National Cyber Director that lays out a roadmap for addressing key security concerns in the BGP routing protocol. Before that, Corey and Marc cover a security research post from Jfrog detailing a new python package hijacking method under active exploitation as well as an analysis of the Microsoft Windows Wi-Fi driver remote code execution vulnerability patched last June.

The 443 Podcast - Episode 305 - The White House Tackles BGP Security

This week on the podcast, we discuss guidance published by the US White House Office of the National Cyber Director that lays out a roadmap for addressing key security concerns in the BGP routing protocol. Before that, we cover a security research post from Jfrog detailing a new python package hijacking method under active exploitation as well as an analysis of the Microsoft Windows Wi-Fi driver remote code execution vulnerability patched last June.

#151 - Exploring AI as it pertains to cybersecurity with George Gerchow, Head of Trust at MongoDB

On this episode of The Cybersecurity Defenders Podcast, we speak with George Gerchow, Head of Trust at MongoDB, about the current narrative surrounding AI in cybersecurity. George challenges the dominant focus on AI as a threat and instead highlights its potential as a powerful ally in defending against sophisticated cyberattacks. We explore how AI-driven defense strategies are reshaping the landscape of proactive threat detection and automated response mechanisms, offering a fresh perspective on balancing security innovation with risk management.

Threat Hunting for macOS - Webinar

MacOS environments are increasingly becoming targets for sophisticated cyber attacks. This webinar delves into advanced threat hunting techniques within macOS, focusing on the utilization of MUL (macOS Unified Logging) events and comprehensive system telemetry. We look at macOS data sources to uncover hidden threats and enhance detection capabilities.