Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

WatchGuard

5 Best Practices to Achieve a Trusted Wireless Environment

Complexity is the new normal, which applies equally to businesses’ networks and wireless environments. This is complicated further by the fact that cyberattacks that seek to exploit vulnerabilities in organizations' WLANs (Wireless Local Area Networks) are becoming increasingly sophisticated. On World Wi-Fi Day, we want to offer you security tips to create a safer wireless environment.

Tutorial: Get Started with Aliases and Exceptions Import

In this WatchGuard Support video, you'll learn how to import aliases and exceptions from a local-managed Firebox configuration file to a cloud-managed Firebox and Firebox templates in WatchGuard Cloud. Includes the import requirements, limitations and handling of duplicate entries.

The 443 Podcast - Episode 247 - A New Russian APT

On this week's episode we discuss the newly named threat actor Cadet Blizzard, including their typical tools, tactics and procedures. We also cover CISA's newest binding directive to federal agencies. Before that, we give an update on exploited MOVEit Transfer servers and the latest Bitcoin laundering technique.

10 Cybersecurity Tips for Business Travel & Remote Employees

Many modern organizations operate in a distributed model, with branch locations and endpoints deployed outside of a physical office. The concept of the network perimeter has expanded dramatically in recent years. It has been pushed by two significant post-pandemic milestones: the implementation of remote work and the return to business travel.

Cyber Threats and Opportunities: What Channel Partners Need to Know to Grow

The cybersecurity landscape is constantly evolving, and channel partners must stay ahead of the curve to successfully defend their customers and grow their businesses. The good news is, according to Canalys, the global cybersecurity market is expected to grow by 13% in 2023, providing channel partners with significant growth opportunities.

The 443 Podcast - Episode 246 - Minecraft Mod Malware

This week on the podcast we cover a supply chain attack of sorts against Minecraft gamers. After that, we cover a vulnerability in MOVEit Transfer that threat actors are exploiting in the wild to steal data and deploy ransomware. Finally, we wne with our review of the latest Verizon Data Breach Investigations Report (DBIR).